1.under the domain name service (DNS) protocol, in the address someo.pdf
ameershoe
13 views
3 slides
Apr 02, 2023
Slide 1 of 3
1
2
3
About This Presentation
1.under the domain name service (DNS) protocol, in the address someone@name1. name2.
name3. name4, the host name is___.
a. someone
b. name1
c. name2
d. name 3
2._____ techniques in an object- based DO/S give the system the ability to perform concurrent
reads and writes, as long as the results of the...
1.under the domain name service (DNS) protocol, in the address someone@name1. name2.
name3. name4, the host name is___.
a. someone
b. name1
c. name2
d. name 3
2._____ techniques in an object- based DO/S give the system the ability to perform concurrent
reads and writes, as long as the results of these actions don\'t jeopardize the contents of the
database.
a. Database redundancy
b. location transparency
c. query processing
d. concurrency control
3. Subroutines that work with the operating system to supervise the transmission of data between
main memory and a peripheral unit are called____.
a. control drivers
b. device controllers
c. device drivers
d. controllers
4. the major difference between a Nos and DO/S involves_____.
a. the cost for each installation
b. the management of local and global resources.
c. the scalability of the network
d. the capabilities provided by the local operating system
5. which of the following is a popular distribution of Linux?
a. Xcode
b. Ubuntu
c. Lion
d. Ugull
6. A____ combines into one program that characteristics of other attacks
a. a blended threat
b. multi-thread virus
c. Trojan Horse
d. worm
7. when deciding which network topology configuration to use, designers should keep in mind
for criteria.
a. basic cost, scalability, reliability, and users environment
b. equipment costs, time to implement, throughput, and security
c. equipment costs, time to implement, reliability, and scalability
d. basic cost, Communications cost, reliability, and users environment
Solution
1.under the domain name service (DNS) protocol, in the address someone@name1. name2.
name3. name4, the host name is_____
b. name1
2._____ techniques in an object- based DO/S give the system the ability to perform concurrent
reads and writes, as long as the results of these actions don\'t jeopardize the contents of the
database.
d. concurrency control
=> The results of all concurrent transactions are the same as if the transactions had been
executed one at a time, in some manner, thus providing serial serialexecution view on database
3. Subroutines that work with the operating system to supervise the transmission of data
between main memory and a peripheral unit are called____.
c. device drivers
=> If the computer uses device that are not supplied with operating system, they should be
obtained from a reliable source.
4. the major difference between a Nos and DO/S involves__how each views and manages the
local and global resources.___.
b. the management of local and global resources.
5. which of the following is a popular distribution of Linux?
b. Ubuntu
=> Ubuntu project has a focus on providing a solid desktop (and server) experience, and it isn’t
afraid to build its own custom technology to do it.
6. A__blended threat__ combines into one program that characteristics of other attacks
including a virus, a Trojen, a worm, key loggers spyware. This single program sues a variety of
tools to attack systems and spread to others.
7. when deciding which.
Size: 26.45 KB
Language: en
Added: Apr 02, 2023
Slides: 3 pages
Slide Content
1.under the domain name service (DNS) protocol, in the address someone@name1. name2.
name3. name4, the host name is___.
a. someone
b. name1
c. name2
d. name 3
2._____ techniques in an object- based DO/S give the system the ability to perform concurrent
reads and writes, as long as the results of these actions don\'t jeopardize the contents of the
database.
a. Database redundancy
b. location transparency
c. query processing
d. concurrency control
3. Subroutines that work with the operating system to supervise the transmission of data between
main memory and a peripheral unit are called____.
a. control drivers
b. device controllers
c. device drivers
d. controllers
4. the major difference between a Nos and DO/S involves_____.
a. the cost for each installation
b. the management of local and global resources.
c. the scalability of the network
d. the capabilities provided by the local operating system
5. which of the following is a popular distribution of Linux?
a. Xcode
b. Ubuntu
c. Lion
d. Ugull
6. A____ combines into one program that characteristics of other attacks
a. a blended threat
b. multi-thread virus
c. Trojan Horse
d. worm
7. when deciding which network topology configuration to use, designers should keep in mind
for criteria.
a. basic cost, scalability, reliability, and users environment
b. equipment costs, time to implement, throughput, and security
c. equipment costs, time to implement, reliability, and scalability
d. basic cost, Communications cost, reliability, and users environment
Solution
1.under the domain name service (DNS) protocol, in the address someone@name1. name2.
name3. name4, the host name is_____
b. name1
2._____ techniques in an object- based DO/S give the system the ability to perform concurrent
reads and writes, as long as the results of these actions don\'t jeopardize the contents of the
database.
d. concurrency control
=> The results of all concurrent transactions are the same as if the transactions had been
executed one at a time, in some manner, thus providing serial serialexecution view on database
3. Subroutines that work with the operating system to supervise the transmission of data
between main memory and a peripheral unit are called____.
c. device drivers
=> If the computer uses device that are not supplied with operating system, they should be
obtained from a reliable source.
4. the major difference between a Nos and DO/S involves__how each views and manages the
local and global resources.___.
b. the management of local and global resources.
5. which of the following is a popular distribution of Linux?
b. Ubuntu
=> Ubuntu project has a focus on providing a solid desktop (and server) experience, and it isn’t
afraid to build its own custom technology to do it.
6. A__blended threat__ combines into one program that characteristics of other attacks
including a virus, a Trojen, a worm, key loggers spyware. This single program sues a variety of
tools to attack systems and spread to others.
7. when deciding which network topology configuration to use, designers should keep in mind
for criteria.
d. basic cost, Communications cost, reliability, and users environment
=> basic cost : expense to link various sites in system
Communications cost : time required to send message from one site to another
reliability : sutes can communicate if there is a failure
users environment : parameters the network must meet for a successful business investment