Answer:
Break activity
Explanation:
The Break activity simply allows a user to stop the loop at any point chosen, and then continue with another activity or the next activity.
Answer:
Option 4 is the correct answer to the above question.
Explanation:
In the Linux operating system, The etc folder is listed on the root directory. When any user wants to go in the root directory of the Linux operating system from anywhere, then he needs to follow the command of the name of the folder where he wants to go with the '/' symbols. The above question states that the user wants to go to the etc folder of the root directory, then he needs to press the command '/etc' with the help of cd command because cd command is used to open any folder. So the option 4 is the correct, while the other is not because--
- Option 1 states about cd which gives the error.
- Option 2 states about cd /home/mary/etc which take the user to the etc folder which is in the mary folder.
- Option 3 states about the cd etc which is used to take the user on the etc folder which is in the current folder.
- Option 5 states about the cd\etc which gives the error.
Answer:
c. 2
Explanation:
As the routers are only involved with the process of finding the best route to reach an IP address (the destination hosts), they don't look at the IP Datagram payload (which includes the transport protocol header), only to IP header.
So, the only transport processes that "talk"each other, are the one on the source host (defining TCP or UDP source port/s, and the other on the destination host (defining TCP or UDP destination port/s), so two applications (or more) in both machines can exchange data.
Answer:
c. traffic shaping
Explanation:
A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.
Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.