In Bluetooth, the_____ link is used when data integrity is more important than avoiding latency.
A)
SCO
B)
ACL
C)
ACO
D)
SCL

1 Answer

Answer :

ACL

Related questions

Description : In Bluetooth, the_____ link is used when avoiding latency (delay in data delivery) is more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL

Last Answer : SCO

Description : Latency time is a. Time to spin the needed data under head b. Time to spin the needed data under track c. Time to spin data under sector d. All of above

Last Answer : Time to spin the needed data under head

Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which of the following most completely describes how independence has been defined by the CPA profession? a. Performing an audit from the viewpoint of the public. b. Avoiding the appearance of ... . d. Possessing the ability to act professionally and accordance with a professional code of ethics.

Last Answer : Possessing the ability to act with integrity and objectivity.

Description : Access time is a. seek time + latency time b. seek time c. seek time – latency time d. latency time

Last Answer : seek time + latency time

Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B

Last Answer : a. A & B

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity

Last Answer : b. Traffic control

Description : Buffer overrun can be reduced by using what? a. Traffic control b. Flow control c. Byte orientation d. Data integrity

Last Answer : b. Flow control

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : In the figure above (not to scale), AB is the diameter of the circle with centre O. If `/_ ACO=30^(@),` then find `/_ BOC`.

Last Answer : In the figure above (not to scale), AB is the diameter of the circle with centre O. If `/_ ACO=30^(@),` then find `/_ BOC`.

Description : The lower red curvy arrow show that CPU places the address extracted from the memory location on the_____: a. Address bus b. System bus c. Control bus d. Data bus

Last Answer : a. Address bus

Description : In Bluetooth, thecurrent data rateis ____Mbps A) 2 B) 5 C) 11 D) none of the above

Last Answer : none of the above

Description : What is the full form of 'SCL' ? -How To ?

Last Answer : The full form of 'SCL' is Shiva Cement Limited

Last Answer : SCL - Space Corporation Limited

Description : Why s2cl2 not exit as scl?

Last Answer : Need answer

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : Which one out of these is not a data link layer technology: a. Bluetooth b. UART c. WIFI d. HTTP

Last Answer : d. HTTP

Description : hich one out of these is not a data link layer technology:- a) Bluetooth b) UART c) WiFi d) HTTP

Last Answer : d) HTTP

Description : Which one out of these is not a data link layer technology? A. Bluetooth B. UART C. Wi-Fi D. HTTP

Last Answer : D. HTTP 

Description : Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply. A. A switch remembers which devices are connected on each interface, while a hub does not. B. A hub is a ... versions of switches. a. A,B b. A,B,C c. A,B,C,D d. A,C,D

Last Answer : b. A,B,C

Description : Shanghai Cooperation Organization (SCO) has ______ dialogue partners: (a) 6 (b) 4 (c) 3 (d) None of these

Last Answer : (a) 6

Description : Shanghai Cooperation Organization (SCO) has 4 observer states which are: (a) Iran, Mongolia, Sri Lanka, Turkey (b) Afghanistan, Nepal, Belarus, Azerbaijan (c) Iran, Afghanistan, Belarus, Turkey (d) Iran, Afghanistan, Belarus, Mongolia

Last Answer : (a) Iran, Mongolia, Sri Lanka, Turkey

Description : Shanghai Cooperation Organization (SCO) has 8 members states which are: (a) Pakistan, China, Russia, India, Iran, Tajikistan, Sri Lanka, Turkey (b) Afghanistan, Russia, Iraq, Turkey, China, ... (c) China, Pakistan, Russia, India, Kazakhstan, Tajikistan, Uzbekistan, Kyrgyzstan (d) None of these

Last Answer : (c) China, Pakistan, Russia, India, Kazakhstan, Tajikistan, Uzbekistan, Kyrgyzstan

Description : Shanghai Cooperation Organization (SCO) has ______ observers states: (a) 2 (b) 4 (c) 6 (d) None of these

Last Answer : (b) 4

Description : Shanghai Cooperation Organization (SCO) has ______ member states: (a) 8 (b) 10 (c) 12 (d) None of these

Last Answer : (b) 10

Description : ____ is one of the most effective ways to grow your business in an increasingly competitive marketplace  A. SEM  B. SEO  C. SCO  D. None of the above

Last Answer : A. SEM

Description : Which company did SCO sue for using code UNIX in its Operating System ? 1) RedaHat 2) SuSE 3) IBM 4) Microsoft

Last Answer : 4) Microsoft

Description : What is the minimum number of wires needed to send data over a serial communication link layer? a. 1 b. 2 c. 4 d. 6 e. none of above

Last Answer : 2

Description : Which data communication method is used to transmit the data over a serial communication link? a. simplex b. half-duplex c. full-duplex d. b and c e. None of above

Last Answer : full-duplex

Description : In OSI network architecture, the routing is performed by a. network layer b. data link layer c. transport layer d. session layer e. none of above

Last Answer : network layer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

Last Answer : session layer

Description : IEEE hasdefined the specifications fora wireless LAN, called _______, whichcovers the physical and data link layers. A) IEEE 802.3 B) IEEE 802.5 C) IEEE 802.11 D) IEEE 802.2

Last Answer : IEEE 802.11

Description : The _______ layer of Ethernet consistsof the LLC sublayer and the MAC sublayer. A) data link B) physical C) network D) none of the above

Last Answer : data link

Description : A ________operates in both thephysical andthe data link layer. A) passive hub B) repeater C) bridge D) router

Last Answer : bridge

Description : A _______ is a connecting devicethat operates in the physical and data link layers of theInternet model. A) repeater B) bridge C) router D) none of the above

Last Answer : bridge

Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove

Last Answer : physical

Description : _______ inthe data link layer separates a message from one source toa destination, or from other messages going from other sources to other destinations. A) Digitizing B) Controlling C) Framing D) none of the above

Last Answer : Framing

Description : Data link control deals withthe design and procedures for ______communication. A) node-to-node B) host-to-host C) process-to-process D) none of the above

Last Answer : node-to-node

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : ________is the set of techniques that allows the simultaneous transmission of multiple signalsacrossa single data link. A) Demodulating B) Multiplexing C) Compressing D) None of the above

Last Answer : Multiplexing

Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)

Last Answer : neither (a) nor (b)

Description : Frame Relay has_______. A) only the physical layer B) only thedata link C) the physical and data link layers D) the physical, data link, andnetwork layers

Last Answer : the physical and data link layers

Description : The routing processor of arouter performs the ________ layer functions of therouter. A) physical and data link B) network C) transport D) none of the above

Last Answer : network

Description : The inputand output portsof a router perform the ________ layer functions of therouter. A) physical and data link B) network C) transport D) none of the above

Last Answer : physical and data link

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes