Description : Which one of the following is not a function of network layer? a. routing b. inter-networking c. congestion control d. error contro
Last Answer : d. error control
Description : Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control
Last Answer : d) error control
Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.
Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic
Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.
Last Answer : Illegal access to private data stored by applications in the cloud.
Description : Another term for clergyman's sore throat is a) chronic granular pharyngitis. In clergyman's sore throat, the pharynx is characterized by numerous swollen lymph follicles. b) ... . Hypertrophic pharyngitis is characterized by general thickening and congestion of the pharyngeal mucous membrane.
Last Answer : a) chronic granular pharyngitis. In clergyman’s sore throat, the pharynx is characterized by numerous swollen lymph follicles.
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer
Last Answer : b. media access control sublayer
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer
Last Answer : B. media access control sublayer
Description : The friend functions are used in situations where A) We want to exchange data between classes B) We want to have access to unrelated classes C) Dynamic binding is required D) We want to create versatile overloaded operators.
Last Answer : A) We want to exchange data between classes
Description : Which services are provided by transport layer? a. Error control b. Connection service c. Connection less service d. Congestion control
Last Answer : a. Error control
Description : Services provided by application layer? A. Web chat B. Error control C. Connection services D. Congestion control
Last Answer : A. Web chat
Description : The inability of a person to recognize his or her own values, beliefs, and practices and those of others because of strong ethnocentric tendencies is termed a) cultural blindness. Cultural blindness ... by rules of behavior that are avoided, forbidden, or prohibited by a particular cultural group.
Last Answer : a) cultural blindness. Cultural blindness results in bias and stereotyping.
Description : …………… is a condition in which there is a set of concurrent processes, only one of which is able to access a given resource or perform a given function at any time. A) Mutual Exclusion B) Busy Waiting C) Deadlock D) Starvation
Last Answer : A) Mutual Exclusion
Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c
Last Answer : A. Flooding
Description : The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure
Last Answer : C. Choke
Description : Find out the wrong feature of DVD among the following: a) DVD is similar to CD but has larger storage capacity and enormous clarity b) DVDs are primarily used to store music or 6 movies and can be played back on ... opposed to around 650 MB of a CD) d) It is not re-writable media e) None of These
Last Answer : e) None of These
Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive
Last Answer : c. Congestive collapse
Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm
Last Answer : a. Flow Control Policy
Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm
Last Answer : (A) Flow Control Policy
Description : What is back propagation? a) It is another name given to the curvy function in the perceptron b) It is the transmission of error back through the network to adjust the inputs c) It is the ... the network to allow weights to be adjusted so that the network can learn d) None of the mentioned
Last Answer : c) It is the transmission of error back through the network to allow weights to be adjusted so that the network can learn
Description : What is back propagation? a) It is another name given to the curvy function in the perceptron b) It is the transmission of error back through the network to adjust the inputs c) It is the ... network to allow weights to be adjusted so that the network can learn. d) None of the mentioned
Last Answer : c) It is the transmission of error back through the network to allow weights to be adjusted so that the network can learn.
Description : An interface that provides I/O transfer of data directly to and form the memory unit and peripheral is termed as________ A. DDA B. Serial interface C. Direct Memory Access (DMA) D. None of the Above
Last Answer : C. Direct Memory Access (DMA)
Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer
Last Answer : a. logical link control sublayer
Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer
Last Answer : A. logical link control sublayer
Description : What is an enormous repository of information stored on millions of computers?
Last Answer : Feel Free to Answer
Description : Some of the C++ operators cannot overloaded which are i) Member access operators (. And .*) ii) Conditional operator (? :) iii) Scope resolution operator (: :) iv) Size operator (sizeof) A) only i, ii and iii B) only ii, iii and iv C) only ii and iv D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : Data is sent to all computers on the _____: a) Addressal b) Trunk c) Portal d) None of These
Last Answer : b) Trunk
Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these
Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers
Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology
Last Answer : ii) Telepsychiatry
Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets
Last Answer : C. Prevent before congestion occurs
Description : When a certificate is unclaimed or remains undelivered at a H.O. or S.O. for any reason and all efforts to deliver the same to the holders have failed, the same will be sent by the _____ for ... HO, Postal account office b) SO, Postal account office c) HO, Circle stamp depot d) None of these
Last Answer : a) HO, Postal account office
Description : If an article issued by RLO either for deliver to the addressees or to return to the sender cannot be delivered a) It may be redirected whenever the revised address of the addressee/sender is not known the ... returned to RLO c) It should be burnt d) It should be sent to the HPO for safe custody
Last Answer : a) It may be redirected whenever the revised address of the addressee/sender is not known the PO
Description : Necessary conditions for deadlock are: a) Non preemptive and circular wait b) Mutual exclusion and partial allocation c) Both of The Above d) None of The Above
Last Answer : b) are privileged calls that are used to perform resource management functions, which are controlled by the operating system
Description : Which act gave the Government enormous control over the management? A. Company's act B. Industrial act C. M.R.T.P. Act D. Both (A) and (B)
Last Answer : D. Both (A) and (B)
Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above
Last Answer : B. queues
Description : Congestion in a network or internetwork occurs because routers and switches have _______
Last Answer : queues
Description : What is meant by congestion? Why the congestion occurs in network?
Last Answer : Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.
Description : The collection of data is achieved with ________ changes. A. Intelligence B. Connectivity C. Dynamic Nature D. Enormous Scale
Last Answer : C. Dynamic Nature
Description : Super Computers termed considered as: a) Dumb Terminal b) Intelligent Terminal c) Smart Terminal d) Super Terminal e) None of These
Last Answer : b) Intelligent Terminal
Description : Which algorithm is used in layered Feed forward Neural Network? (A) Back propagation algorithm (B) Binary Search (C) Both(A) & (B) (D) None of the Above
Last Answer : (A) Back propagation algorithm
Description : Which of the following factors would most likely cause a CPA to decide not to accept a new audit engagement? a. The CPA's lack of understanding of the prospective client's internal auditor's ... . d. Management's refusal to permit the CPA to perform substantive tests before the year-end.
Last Answer : Management’s disregard of its responsibility to maintain an adequate internal control environment
Description : Use of sublingual/oral nifedipine soft geletine capsule for rapid BP lowering in hypertensive urgency has been discarded because of: A. Delayed onset of action B. Inability to control the rate and extent of fall in BP C. Reports of adverse/fatal outcome D. Both 'B' and 'C'
Last Answer : D. Both 'B' and 'C'
Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these
Last Answer : Answer :4
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2
Last Answer : 1) 1 only
Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned
Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv
Last Answer : It's D
Description : The combination of ........... and ............. is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number. D) All of the above
Last Answer : C) Subnet number and host number.
Description : Select a travel lane with the least amount of congestion and stay in the lane you have chosen until you need to turn, __________, or avoid a hazard.?
Last Answer : pass another vehicle
Description : In the slow start phase of the TCP congestion control algorithm, the size of the congestion window a. does not increase b. increases linearly c. increases quadratically d. increases exponentially
Last Answer : d. increases exponentially