- •It must run without some of the protection mechanisms that guard against faulty instructions or illegal memory accesses.
- •Interrupt handlers have read-write access to the data an application stores in the registers
- •Vector graphics
- •It is an example of a code review
- •Integrated Development Environment
- •Identify the type of email attachment so a suitable program can be used to open the attachmen
- •Is assigned to a computer and may change the next time the computer connects to the network
- •Intrusion detection system
Identify the type of email attachment so a suitable program can be used to open the attachmen
|
159. |
|
Which of the following can be used to specify that the XML for the contact details of a person can contain an email address XML element, but the email address XML element cannot contain the superset representing the contact details of a person? |
|
Document Type Definition (DTD)
160. |
|
A drive letter (E.g., “E:”) can be assigned to a network shared folder using: |
|
Drive mapping
|
161. |
|
An IPv4 address is a set of four numbers between 0 and |
|
255
|
162. |
|
The type of connector typically used for Unshielded Twisted Pair and Shielded Twisted Pair is |
|
RJ45
|
163. |
|
Which of the following does not typically require the use of a network user account? |
|
Save a file on the local workstation
|
164. |
|
Which type of software is used to automate the routing of documents? |
|
Workflow software
|
165. |
|
Which of the following is not a local resource? |
|
Printer connected to a print server
|
166. |
|
Which of the following types of characters is usually invalid for passwords? |
|
Spaces
|
167. |
|
Which of the following would you use to setup a network printer on the workstation? |
|
Add Printer Wizard
|
168. |
|
Which of the following is more susceptible to electrical and radio frequency interference? |
|
Unshielded Twisted Pair
169. |
|
Which of the following statements is false? |
|
Email servers cannot communicate with other email servers
|
170. |
|
Which of the following are valid examples of client-server systems on the Internet?
|
|
|
171. |
|
Which of the following statements is true? |
|
Java applets can be used to act as thick clients
|
172. |
|
A network that operates without a central server is called a: |
|
Peer-to-peer network
|
173. |
|
Client software that performs a substantial portion of work is referred to as: |
|
Thick client
174. |
|
Rules used by devices to encode and decode data are referred to as |
|
Protocols
|
175. |
|
Which of the following is suitable for fast Ethernet connections? |
|
Category 5 UTP
|
176. |
|
Which of the following describes one-way communication? |
|
Simplex communication
|
177. |
|
Which of the following is a characteristic of bus networks? |
|
Devices are connected to a central cable
|
178. |
|
Which of the following cables is unsuitable for data transmission? |
|
Category 1 UTP
|
179. |
|
When two devices communicate, they must agree on protocols for
|
|
|
180. |
|
Which of the following is not a LAN protocol? |
|
X25
|
181. |
|
Which of the following types of network connection services use strictly digital transfers of data? I. ISDN II. T1 III. Cable modem |
|
|
182. |
|
Which of the following is not determined by communication protocols? |
|
User accounts
|
183. |
|
The rate at which data is transmitted is referred to as |
|
Throughput
|
184. |
|
Which of the following statements about digital signals is false? |
|
Digital signals require more complex circuitry
|
185. |
|
The height of electromagnetic signal waves is referred to as |
|
Amplitude
|
186. |
|
For situations where extremely high bandwidth is required, _____ cable is the best solution. |
|
fiber-optic
187. |
|
Which of the following utilities can be used to find all hops between two hosts on a network? |
|
TRACERT
|
188. |
|
Which of the following statements is false? |
|
DNS services are used to assign IP addresses
|
189. |
|
What is the name of the Internet protocol used to make sure messages are reliably transmitted and received by the destination computer? |
|
TCP
|
190. |
|
The length of an Ethernet address is |
|
48 bits
|
191. |
|
Which of the following is a possible cause of data loss during routing? |
|
The data is routed across multiple hops and the queue on one of the routers is full
|
192. |
|
The link speed of an OC-3 connection is: |
|
155Mbps
|
193. |
|
The link speed of a T3 line is |
|
45Mbps
|
194. |
|
If a URL begins with the protocol HTTPS, then
|
|
|
195. |
|
Which of the following statements is false about the Internet backbone? |
|
The Internet backbone connects Internet users to each other directly
|
196. |
|
What is the protocol used to transfer Web pages? |
|
http
|
197. |
|
A dynamic IP address: |
|