Certification Questions

Q:

The three tier in R/3 system is represented by

A. user, data base, programs

B. application, data base and customer of R/3

C. presentation client, R/3 application and data base

D. data, user and application

Answer

Answer : C

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

1 3749
Q:

Which part of a MAC address is called the organizationally unique identifier(OUI)?

A) The first 24 bits, or 3 bytes B) The first 12 bits, or 3 bytes
C) The first 24 bits, or 6 bytes D) The first 32 bits, or 3 bytes
 
Answer & Explanation Answer: A) The first 24 bits, or 3 bytes

Explanation:

The first 24 bits, or 3 bytes, of a MAC address is called the organizationally unique identifier (OUI).

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3747
Q:

Suppose a System z customer has a new CIO. The CIO is concerned about continuing operations and recovery following a catastrophe.Which of the following addresses this issue?

A) GDPS B) TAM
C) DR D) WASS
 
Answer & Explanation Answer: A) GDPS

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

5 3737
Q:

You have a reference computer that runs Windows 7.

You plan to deploy an image of the computer.

You create an answer file named answer.xml.

You need to ensure that the installation applies the answer file after you deploy the image. Which command should you run before you capture the image?

A) Imagex.exe /append answer.xml /check B) Imagex.exe /mount answer.xml /verify
C) Sysprep.exe /reboot /audit /unattend:answer.xml D) Sysprep.exe /generalize /oobe /unattend:answer.xml
 
Answer & Explanation Answer: D) Sysprep.exe /generalize /oobe /unattend:answer.xml

Explanation:
Report Error

View Answer Report Error Discuss

5 3716
Q:

Communication requirements are defined by

A) the adaptation of the theory of sender-receiver models to the dominant listening and learning style of each stakeholder. B) the logistics of how many individuals will be involved with the project and at which locations.
C) the technologies or methods available to transfer information back and forth among project stakeholders. D) combining the type and format of information required with an analysis of the value of that information.
 
Answer & Explanation Answer: D) combining the type and format of information required with an analysis of the value of that information.

Explanation:

“ Communication requirements are defined by combining the type and format of information needed with an analysis of the value of that information.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3715
Q:

What is the formula for ranking keyword-targeted ads on the Search Network?

Answer

(Maximum Cost Per Click) x (Quality Score)

Report Error

View answer Workspace Report Error Discuss

12 3694
Q:

What is the default return value of a function?

A) int B) char
C) string D) None of the above
 
Answer & Explanation Answer: A) int

Explanation:

The default return value from a function is int. In other words, unless explicitly specified the default return value by compiler would be integer value from function.

Report Error

View Answer Report Error Discuss

3 3694
Q:

What network service is the most likely problem if you can ping a computer by IP address but not by name?

A) DNS B) DHCP
C) ARP D) ICMP
 
Answer & Explanation Answer: A) DNS

Explanation:

 The most likely problem if you can ping a computer by IP address but not by name is a failure of DNS.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3683