Description : In Bluetooth, the_____ link is used when data integrity is more important than avoiding latency. A) SCO B) ACL C) ACO D) SCL
Last Answer : ACL
Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction
Last Answer : d. Error detection and correction
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b
Last Answer : C. Congestion
Description : Which layer is responsible for process to process delivery in a general network model? a) network layer b) transport layer c) session layer d) data link layer
Last Answer : b) transport layer
Description : The _________ product defines the number ofbits that can fill the link. A) bandwidth-period B) frequency-amplitude C) bandwidth-delay D) delay-amplitude
Last Answer : bandwidth-delay
Description : Latency time is a. Time to spin the needed data under head b. Time to spin the needed data under track c. Time to spin data under sector d. All of above
Last Answer : Time to spin the needed data under head
Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)
Last Answer : neither (a) nor (b)
Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization
Last Answer : cyclic redundancy codes
Description : The layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation
Last Answer : A) Physical
Description : Which among the following represents the objectives/requirements of Data Link Layer? a. Frame Synchronization b. Error & Flow Control c. Both a & b d. None of the above
Last Answer : c. Both a & b
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer
Last Answer : b. media access control sublayer
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer
Last Answer : B. media access control sublayer
Description : ............. is the time required to move the disk arm to the required track. A) Seek time B) Rotational delay C) Latency time D) Access time
Last Answer : A) Seek time
Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which among the following is correct about goals in cryptography: a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps ... not be able to deny sending the message e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : Which of the following most completely describes how independence has been defined by the CPA profession? a. Performing an audit from the viewpoint of the public. b. Avoiding the appearance of ... . d. Possessing the ability to act professionally and accordance with a professional code of ethics.
Last Answer : Possessing the ability to act with integrity and objectivity.
Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above
Last Answer : best-effort delivery
Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above
Last Answer : noneof the above
Description : Answer: e The role of nutritional support in the cancer patient remains an important component of overall therapy. Preoperative nutritional support should be given only to those patients who ... of bowel rest; this atrophy is not reversed by currently available total parenteral nutrition solutions
Last Answer : Which of the following hormones can be expected to be released as part of the stress response? a. Antidiuretic hormone (ADH) b. Aldosterone c. Insulin d. Epinephrine nswer: a, b, d ... This hormone has the exact opposite effect of insulin, which promotes glucose storage and uptake by the cells
Description : Access time is a. seek time + latency time b. seek time c. seek time – latency time d. latency time
Last Answer : seek time + latency time
Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B
Last Answer : a. A & B
Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above
Last Answer : protecting data indata communication systems
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity
Last Answer : b. Traffic control
Description : Buffer overrun can be reduced by using what? a. Traffic control b. Flow control c. Byte orientation d. Data integrity
Last Answer : b. Flow control
Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer
Last Answer : a. logical link control sublayer
Description : The functions of a Logical Link Layer (LLC) are a. Error control b. Flow control c. Creating and managing the communication link between two devices with the help of the Transport layer. d. All the above
Last Answer : d. All the above
Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer
Last Answer : A. logical link control sublayer
Description : The functions of a Logical Link Layer (LLC) are ___. A. Error control B. Flow control C. Creating and managing the communication link between two devices with the help of the Transport layer. D. All the above
Last Answer : D. All the above
Description : In the figure above (not to scale), AB is the diameter of the circle with centre O. If `/_ ACO=30^(@),` then find `/_ BOC`.
Last Answer : In the figure above (not to scale), AB is the diameter of the circle with centre O. If `/_ ACO=30^(@),` then find `/_ BOC`.
Description : The lower red curvy arrow show that CPU places the address extracted from the memory location on the_____: a. Address bus b. System bus c. Control bus d. Data bus
Last Answer : a. Address bus
Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes
Last Answer : A. Checksum
Description : In Bluetooth, thecurrent data rateis ____Mbps A) 2 B) 5 C) 11 D) none of the above
Last Answer : none of the above
Description : Which one of the following statements is FALSE? a. Packet switching leads to better utilization of bandwidth resources than circuit switching. b. Packet switching results in less variation ... than circuit switching d. Packet switching can lead to reordering unlike in circuit switching
Last Answer : Packet switching results in less variation in delay than circuit switching.
Description : What is the full form of 'SCL' ? -How To ?
Last Answer : The full form of 'SCL' is Shiva Cement Limited
Last Answer : SCL - Space Corporation Limited
Description : Why s2cl2 not exit as scl?
Last Answer : Need answer
Description : In a network, when the load is much less than the capacity of the network, the delay is _________ A. at a maximum B. at a minimum C. constant D. none of the above
Last Answer : B. at a minimum
Description : Which consequences are more likely to occur during the frame transmission in StopandWait ARQ mechanism? a. Loss of frame or an acknowledgement b. Delay in an acknowledgement c. Normal operation d. All of the above
Last Answer : d. All of the above
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above
Last Answer : c. Checksum
Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL
Last Answer : C. ESP
Description : The most significant nursing problem related to continuous tube feedings is a) potential for aspiration Because the normal swallowing mechanism is bypassed, consideration of the danger of ... in fat metabolism and lipoprotein synthesis Tube feedings maintain fat metabolism and lipoprotein synthesis.
Last Answer : a) potential for aspiration Because the normal swallowing mechanism is bypassed, consideration of the danger of aspiration must be foremost in the mind of the nurse caring for the patient receiving continuous tube feedings.
Description : Which of the following is an acronym for electronic delay storage automatic calculator? a. UNIVAC b. EDSAC c. EDVAC d. Abacus
Last Answer : EDSAC
Description : Time during which a job is processed by the computer is a. Delay times b. Real time c. Execution time d. Down time
Last Answer : Execution time
Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove
Last Answer : ATM