1.
Which one of the following is concerned with the meaning of a sentence in knowledge representation?
2.
Which one of the following is an attack performed by wiretapping a network and illicitly copy files and programs?
3.
If a company wants to develop a software for its use, and if the company wants partial functionality to be delivered to end users without unreasonable delay. Which software development process model is appropriate for such requirement?
4.
Which one of the following cannot affect proper functioning of a system?
5.
_______ is the process of selecting appropriate query execution strategy?
6.
Let KPRIV-A and KPUB-A be private and public keys for Awgichew and KPRIV-M and KPUB-M are private and public keys for Meron respectively. If Awgichew would like to send secured message to Meron, which one of the following scenario is not correct if they are using asymmetric keys?
7.
Which one of the following agents works by searching and matching the rules defined by percent and stored internal state?