You are the network administrator for a midsize computer company. You have a single Active Directory forest, and you have a requirement to implement DHCP for the organization. You need to ensure that your DHCP deployment configuration is both fault tolerant and redundant. Out of the following options provided, which one is the most reliable DHCP configuration that you could implement?

a. DHCP failover
b. DHCP split scope
c. DHCP super scope
d. DHCP multicast scope

Which one of the following statements correctly defines the prototype of a function named sum that expects two integer arguments and returns an integer value to its caller in C++?

a. int sum(int, int);
b. void sum(int x, int y)
c void sum(int x, int y);
d. int sum(int, int)

In a facility a data quality assessment was performed for a data element, it was found that the counted amount of the data is gre Which one of the following T-SQL statements is valid to add an SQL Server login named "MoEUser" as a member of a fixed server-level role called bulkadmin?

a. ALTER SERVER ROLE ADD MEMBER
MOEUser;
b. ALTER ROLE bulkadminADD MEMBER
MOEUser;
c. ALTER SERVER ROLE bulkadmin ADD
MEMBER MOEUser;
d. ALTER SERVER ROLE bulkadmin INSERT
MEMBER MOEUser;

Which one of the following statements is correct in Java?

a. If a static method defined in the superclass is redefined in a subclass, the method is
said to be overridden.
b. If a private method defined in the superclass is redefined in a subclass, the two
methods are said to be overloaded.
c. If a static method defined in the superclass is redefined in a subclass, the method is
said to be overloaded.
d. If a private method defined in the superclass is redefined in a subclass, the two
methods are completely unrelated.

Which one of the following is false about personal health record?
a. The individual decides who can access his/her record
b. It gives the individual access to his/her data
c. It is controlled by the individual/patient
d. The data is filled by a central data clerk

In developed countries surgeries using a robot assisted by a specialist physician from a different location are becoming more common. Which type of telemedicine is in use in such cases?

a. Remote monitoring
b. Asynchronous
c. Store-and-forward
d. Real-time

Which one of the following is not required to open a MySQL database connection or connect to a server in PHP using MySQLi extension?

a. Database name
b. Server name
c. User name and password
d. Table name

Which type of analysis would you use if you are asked to show how many households have subscribed to the community based health insurance scheme within 10KM proximity of a health center?

a. Buffer analysis
b. Spatial regression analysis
c. Spatial interpolation
d. Clip tool

Which one of the following statements describes the use of the break keyword in C++?

a. To exit from for loop and while loop.
b. To continue to the next iteration in do while loop.
c. To continue to the next iteration in for loop.
d. To continue to the next iteration in while loop.

Which one of the following defines electrostatic discharge (ESD) correctly in computer maintenance?

a. ESD is noise caused by electrical devices such as computer and vacuum cleaner.
b. ESD is a strap that equalizes the voltage potential between a technician and a computer.
c. ESD is a difference of potential between two items that cause static electricity.
d. ESD is a device that protects electronic gear from being affected by static charges.

a. ESD is a difference of potential between two items that cause static electricity.