Answer:
B. Balanced depending and the type of questions
Answer:
Agile Development is a software methodology which is iterative.
Explanation:
Agile Development is a software methodology which is iterative.it is more useful to develop complex systems where regular touch up meetings/calls happen with the business to showcase their progress and ensure that the application is going in right direction. Compared to Waterfall ,where all phases are in sequence it is more recommended to design and develop complex software projects.
Agile Development is useful for complex software projects where we regularly in touch with the client and take our design and development decisions based on client feedback
Waterfall methodology is useful for simple projects where all the requirements are clear at the beginning and no more changes in requirement are required
Answer: Option [C] : The longest time path through the network.
Explanation:
The critical path of a network is the longest time path through the network.
Answer:
Both keep email on an email server by default is true about POP3 and IMAP for incoming email
Explanation:
POP3 and IMAP have used setting parameters for incoming email in MS-outlook and lotus domino to receive emails for the end-user.
Normally pop3 will nor keeps mail in emails in the server. once the end-user receives mails for the specific account it deletes emails from the email server.
But IMAP keeps mail in the email server. So the end-user can retrieve the old emails in case he formatted or lost emails.
But email account has some limitation in size. If it is IMAP setting period cleaning should be done in the email server. If it is not done the end-user will not receive any email unless or until deleting the old emails.
Best method is to have pop3 account. But in pop3 still setting can be done in email server not delete for specific period of time.
Answer:
192.168.228.0 255.255.255.224
Explanation:
192.168.228.0 255.255.255.128
subnet mask: defines the host and the network part of a ip
CIDR notation : is the shortened form for subnet mask that uses the number of host bits for defining the host and the network part of a ip
For example: 192.168.228.0 255.255.255.128 has CIDR equivalent of 192.168.228.0\25
To have atleast 20 hosts
20 ≤ (2^x) -2
x ≈5
with 5 host bits, we have 2^5-2 = 30 hosts per subnet
and 2^3 = 8 subnets
To get the subnet mask, we have 3 network bits
1110000 to base 10 = 2^7 + 2^6 +2^5= 224
192.168.228.0 255.255.255.224