Certification Questions

Q:

Which of the following connection mechanism is used by Ethernet?

A) Token passing B) CSMA/CD
C) CSMA/CA D) Host polling
 
Answer & Explanation Answer: B) CSMA/CD

Explanation:

Ethernet networking uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2702
Q:

Which of the following is a result of route aggregation?

A) Smaller routing tables B) More complete routing tables
C) Increased memory usage D) Increased CPU usage
 
Answer & Explanation Answer: A) Smaller routing tables

Explanation:

Route aggregation results in smaller routing tables.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2693
Q:

Project Life Cycle - Characteristic of Project Phases

What is a deliverable?

Answer

A deliverable is a measurable, verifiable work product such as a specification, feasibility study report, detailed design document, or working prototype.

Report Error

View answer Workspace Report Error Discuss

0 2677
Q:

What is the difference between a Local and a Global temporary table?

Answer

Local :


Only available to the current Db connection for current user and are cleared when connection is closed.


Multiple users can’t share a local temporary table.


 


Global:


Available to any connection once created. They are cleared when the last connection is closed.


Can be shared by multiple user sessions

Report Error

View answer Workspace Report Error Discuss

1 2676
Q:

The corporate office sends you a new router to connect, but upon connecting the console cable, you see that there is already a configuration on the router. What should be done before a new configuration is entered in the router?

A) RAM should be erased and the router restarted B) Flash should be erased and the router restarted
C) NVRAM should be erased and the router restarted D) The new configuration should be entered and saved
 
Answer & Explanation Answer: C) NVRAM should be erased and the router restarted

Explanation:

Before you start to configure the router, you should erase the NVRAM with the erase startup-config command and then reload the router using the reload command.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2674
Q:

In Which part of the Windows 2000 architecture do applications run in?

A) User mode B) Kernel mode
C) Window Manager D) Executive Services
 
Answer & Explanation Answer: A) User mode

Explanation:

Applications and their subsystems  run in user mode.

Report Error

View Answer Report Error Discuss

0 2671
Q:

What are the different types of SQL statements ?

Answer

SQL statements are broadly classified into three. They are


1. DDL – Data Definition Language


DDL is used to define the structure that holds the data. For example, Create, Alter, Drop and Truncate table.


2. DML – Data Manipulation Language


DML is used for manipulation of the data itself. Typical operations are Insert, Delete, Update and retrieving the data from the table. The Select statement is considered as a limited version of the DML, since it can't change the data in the database. But it can perform operations on data retrieved from the DBMS, before the results are returned to the calling function.


3. DCL – Data Control Language


DCL is used to control the visibility of data like granting database access and set privileges to create tables, etc. Example - Grant, Revoke access permission to the user to access data in the database.

Report Error

View answer Workspace Report Error Discuss

4 2669
Q:

which of the following represents a set of properties that guarantee that database transactions are processed reliably in computer science ?

A) Buffer Cache B) ACID
C) Foreign Key D) None
 
Answer & Explanation Answer: B) ACID

Explanation:

ACID means (Atomicity, Consistency, Isolation, Durability) is a set of properties of database transactions intended to guarantee validity even in the event of errors, power failures, etc.

In the context of databases, a sequence of database operations that satisfies the ACID properties and, thus, can be perceived as single logical operation on the data, is called a transaction. For example, a transfer of funds from one bank account to another, even involving multiple changes such as debiting one account and crediting another, is a single transaction.

Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification
Job Role: Analyst , IT Trainer

6 2663