The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ . (1) Access control (2) Congestion (3) Error propagation (4) Deadlock

1 Answer

Answer :

Congestion

Related questions

Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro

Last Answer : d. error control

Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control

Last Answer : d) error control

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : Another term for clergyman's sore throat is a) chronic granular pharyngitis. In clergyman's sore throat, the pharynx is characterized by numerous swollen lymph follicles. b) ... . Hypertrophic pharyngitis is characterized by general thickening and congestion of the pharyngeal mucous membrane.

Last Answer : a) chronic granular pharyngitis. In clergyman’s sore throat, the pharynx is characterized by numerous swollen lymph follicles.

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer

Last Answer : b. media access control sublayer

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer

Last Answer : B. media access control sublayer

Description : The friend functions are used in situations where A) We want to exchange data between classes B) We want to have access to unrelated classes C) Dynamic binding is required D) We want to create versatile overloaded operators.

Last Answer : A) We want to exchange data between classes

Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control

Last Answer : a. Error control

Description : Services provided by application layer? A. Web chat B. Error control C. Connection services D. Congestion control

Last Answer : A. Web chat 

Description : …………… is a condition in which there is a set of concurrent processes, only one of which is able to access a given resource or perform a given function at any time. A) Mutual Exclusion B) Busy Waiting C) Deadlock D) Starvation

Last Answer : A) Mutual Exclusion

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure

Last Answer : C. Choke

Description : Find out the wrong feature of DVD among the following: a) DVD is similar to CD but has larger storage capacity and enormous clarity b) DVDs are primarily used to store music or 6 movies and can be played back on ... opposed to around 650 MB of a CD) d) It is not re-writable media e) None of These

Last Answer : e) None of These

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm

Last Answer : a. Flow Control Policy

Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm

Last Answer : (A) Flow Control Policy

Description : What is back propagation? a) It is another name given to the curvy function in the perceptron b) It is the transmission of error back through the network to adjust the inputs c) It is the ... the network to allow weights to be adjusted so that the network can learn d) None of the mentioned

Last Answer : c) It is the transmission of error back through the network to allow weights to be adjusted so that the network can learn

Description : What is back propagation? a) It is another name given to the curvy function in the perceptron b) It is the transmission of error back through the network to adjust the inputs c) It is the ... network to allow weights to be adjusted so that the network can learn. d) None of the mentioned

Last Answer : c) It is the transmission of error back through the network to allow weights to be adjusted so that the network can learn.

Description : An interface that provides I/O transfer of data directly to and form the memory unit and peripheral is termed as________ A. DDA B. Serial interface C. Direct Memory Access (DMA) D. None of the Above

Last Answer : C. Direct Memory Access (DMA)

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : What is an enormous repository of information stored on millions of computers?

Last Answer : Feel Free to Answer

Description : Some of the C++ operators cannot overloaded which are i) Member access operators (. And .*) ii) Conditional operator (? :) iii) Scope resolution operator (: :) iv) Size operator (sizeof) A) only i, ii and iii B) only ii, iii and iv C) only ii and iv D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Data is sent to all computers on the _____: a) Addressal b) Trunk c) Portal d) None of These

Last Answer : b) Trunk

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology

Last Answer : ii) Telepsychiatry

Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets

Last Answer : C. Prevent before congestion occurs

Description : When a certificate is unclaimed or remains undelivered at a H.O. or S.O. for any  reason and all efforts to deliver the same to the holders have failed, the same will be sent  by the _____ for ... HO, Postal account office b) SO, Postal account office c) HO, Circle stamp depot d) None of these

Last Answer : a) HO, Postal account office

Description : If an article issued by RLO either for deliver to the addressees or to return to the sender cannot be delivered a) It may be redirected whenever the revised address of the addressee/sender is not known the ... returned to RLO c) It should be burnt d) It should be sent to the HPO for safe custody

Last Answer : a) It may be redirected whenever the revised address of the addressee/sender is not known the PO

Description : Necessary conditions for deadlock are: a) Non preemptive and circular wait b) Mutual exclusion and partial allocation c) Both of The Above d) None of The Above

Last Answer : b) are privileged calls that are used to perform resource management functions, which are controlled by the operating system

Description : Which act gave the Government enormous control over the management? A. Company's act B. Industrial act C. M.R.T.P. Act D. Both (A) and (B)

Last Answer : D. Both (A) and (B)

Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above

Last Answer : B. queues

Description : Congestion in a network or internetwork occurs because routers and switches have _______

Last Answer : queues

Description : What is meant by congestion? Why the congestion occurs in network?

Last Answer : Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.

Description : The collection of data is achieved with ________ changes. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale

Last Answer : C. Dynamic Nature 

Description : Super Computers termed considered as: a) Dumb Terminal b) Intelligent Terminal c) Smart Terminal d) Super Terminal e) None of These

Last Answer : b) Intelligent Terminal

Description : Which algorithm is used in layered Feed forward Neural Network? (A) Back propagation algorithm (B) Binary Search (C) Both(A) & (B) (D) None of the Above

Last Answer : (A) Back propagation algorithm

Description : Which of the following factors would most likely cause a CPA to decide not to accept a new audit engagement? a. The CPA's lack of understanding of the prospective client's internal auditor's ... . d. Management's refusal to permit the CPA to perform substantive tests before the year-end.

Last Answer : Management’s disregard of its responsibility to maintain an adequate internal control environment

Description : Use of sublingual/oral nifedipine soft geletine capsule for rapid BP lowering in hypertensive urgency has been discarded because of: A. Delayed onset of action B. Inability to control the rate and extent of fall in BP C. Reports of adverse/fatal outcome D. Both 'B' and 'C'

Last Answer : D. Both 'B' and 'C'

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2

Last Answer : 1) 1 only

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv

Last Answer : It's D

Description : The combination of ........... and ............. is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number. D) All of the above

Last Answer : C) Subnet number and host number.

Description : Select a travel lane with the least amount of congestion and stay in the lane you have chosen until you need to turn, __________, or avoid a hazard.?

Last Answer : pass another vehicle

Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially

Last Answer : d. increases exponentially