In Bluetooth, the_____ link is used when avoiding latency (delay in data delivery) is more important than integrity (error-free delivery).
A)
SCO
B)
ACL
C)
ACO
D)
SCL

1 Answer

Answer :

SCO

Related questions

Description : In Bluetooth, the_____ link is used when data integrity is more important than avoiding latency. A) SCO B) ACL C) ACO D) SCL

Last Answer : ACL

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b

Last Answer : C. Congestion

Description : Which layer is responsible for process to process delivery in a general network model? a) network layer b) transport layer c) session layer d) data link layer

Last Answer : b) transport layer

Description : The _________ product defines the number ofbits that can fill the link. A) bandwidth-period B) frequency-amplitude C) bandwidth-delay D) delay-amplitude

Last Answer : bandwidth-delay

Description : Latency time is a. Time to spin the needed data under head b. Time to spin the needed data under track c. Time to spin data under sector d. All of above

Last Answer : Time to spin the needed data under head

Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)

Last Answer : neither (a) nor (b)

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : The layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : Which among the following represents the objectives/requirements of Data Link Layer? a. Frame Synchronization b. Error & Flow Control c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer

Last Answer : b. media access control sublayer

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer

Last Answer : B. media access control sublayer

Description : ............. is the time required to move the disk arm to the required track. A) Seek time B) Rotational delay C) Latency time D) Access time

Last Answer : A) Seek time

Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which of the following most completely describes how independence has been defined by the CPA profession? a. Performing an audit from the viewpoint of the public. b. Avoiding the appearance of ... . d. Possessing the ability to act professionally and accordance with a professional code of ethics.

Last Answer : Possessing the ability to act with integrity and objectivity.

Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above

Last Answer : best-effort delivery

Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above

Last Answer : noneof the above

Description : Answer: e The role of nutritional support in the cancer patient remains an important component of overall therapy. Preoperative nutritional support should be given only to those patients who ... of bowel rest; this atrophy is not reversed by currently available total parenteral nutrition solutions

Last Answer : Which of the following hormones can be expected to be released as part of the stress response? a. Antidiuretic hormone (ADH) b. Aldosterone c. Insulin d. Epinephrine nswer: a, b, d ... This hormone has the exact opposite effect of insulin, which promotes glucose storage and uptake by the cells

Description : Access time is a. seek time + latency time b. seek time c. seek time – latency time d. latency time

Last Answer : seek time + latency time

Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B

Last Answer : a. A & B

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity

Last Answer : b. Traffic control

Description : Buffer overrun can be reduced by using what? a. Traffic control b. Flow control c. Byte orientation d. Data integrity

Last Answer : b. Flow control

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : The functions of a Logical Link Layer (LLC) are a. Error control b. Flow control c. Creating and managing the communication link between two devices with the help of the Transport layer. d. All the above

Last Answer : d. All the above

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : The functions of a Logical Link Layer (LLC) are ___. A. Error control B. Flow control C. Creating and managing the communication link between two devices with the help of the Transport layer. D. All the above

Last Answer : D. All the above

Description : In the figure above (not to scale), AB is the diameter of the circle with centre O. If `/_ ACO=30^(@),` then find `/_ BOC`.

Last Answer : In the figure above (not to scale), AB is the diameter of the circle with centre O. If `/_ ACO=30^(@),` then find `/_ BOC`.

Description : The lower red curvy arrow show that CPU places the address extracted from the memory location on the_____: a. Address bus b. System bus c. Control bus d. Data bus

Last Answer : a. Address bus

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : In Bluetooth, thecurrent data rateis ____Mbps A) 2 B) 5 C) 11 D) none of the above

Last Answer : none of the above

Description : Which one of the following statements is FALSE? a. Packet switching leads to better utilization of bandwidth resources than circuit switching. b. Packet switching results in less variation ... than circuit switching d. Packet switching can lead to reordering unlike in circuit switching

Last Answer : Packet switching results in less variation in delay than circuit switching.

Description : What is the full form of 'SCL' ? -How To ?

Last Answer : The full form of 'SCL' is Shiva Cement Limited

Last Answer : SCL - Space Corporation Limited

Description : Why s2cl2 not exit as scl?

Last Answer : Need answer

Description : In a network, when the load is much less than the capacity of the network, the delay is _________ A. at a maximum B. at a minimum C. constant D. none of the above

Last Answer : B. at a minimum

Description : Which consequences are more likely to occur during the frame transmission in StopandWait ARQ mechanism? a. Loss of frame or an acknowledgement b. Delay in an acknowledgement c. Normal operation d. All of the above

Last Answer : d. All of the above

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : The most significant nursing problem related to continuous tube feedings is a) potential for aspiration Because the normal swallowing mechanism is bypassed, consideration of the danger of ... in fat metabolism and lipoprotein synthesis Tube feedings maintain fat metabolism and lipoprotein synthesis.

Last Answer : a) potential for aspiration Because the normal swallowing mechanism is bypassed, consideration of the danger of aspiration must be foremost in the mind of the nurse caring for the patient receiving continuous tube feedings.

Description : Which of the following is an acronym for electronic delay storage automatic calculator? a. UNIVAC b. EDSAC c. EDVAC d. Abacus

Last Answer : EDSAC

Description : Time during which a job is processed by the computer is a. Delay times b. Real time c. Execution time d. Down time

Last Answer : Execution time

Description : Time during which a job is processed by the computer is a. Delay times b. Real time c. Execution time d. Down time

Last Answer : Execution time

Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove

Last Answer : ATM