A(n) _________ is generated by a failure such as power failure or memory parity error.

A. I/O interrupt
B. hardware failure interrupt
C. timer interrupt
D. program interrupt


B. hardware failure interrupt

Computer Science & Information Technology

You might also like to view...

If both sender and receiver use the same key, the system is referred to as:

A) public-key encryption B) two-key C) asymmetric D) conventional encryption

Computer Science & Information Technology

The ________ acts as the administrator of the network

A) client-server B) node C) architecture D) server

Computer Science & Information Technology

A network administrator is tasked to block all outbound SSH connections on the default port from a network subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would accomplish this task?

A. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j REJECT B. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j REJECT C. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j ACCEPT D. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j ACCEPT

Computer Science & Information Technology

Which of the following statements best describes a one-to-many relationship between two tables?

A) A foreign key in the first table matches several primary keys in the second table. B) Primary and foreign keys have multiple cross matches between a first and second table. C) A primary key in the first table matches exactly one foreign key in the second table. D) A primary key in the first table matches several foreign keys in the second table.

Computer Science & Information Technology