In which mode can the computers that are associated send frames directly to each other? (1) Adhoc mode (2) Infrastructure mode (3) Structured mode (4) Anonymous mode 

1 Answer

Answer :

Adhoc mode

Related questions

Description : Usually downloaded into folders that hold temporary internet files, _____ are written to your computer's hard disk by some of the websites you visit. a) anonymous files b) behaviour files c) banner ads d) cookies e) None of these

Last Answer : d) cookies

Description : The Indian Constitution provides for the appointment of Adhoc judges in: (1) Supreme Court (2) High Court (3) District and Session Court (4) All of these

Last Answer : (1) Supreme Court Explanation: The Indian Constitution provides for the appointment of Ad hoc judge in supreme court. A Judge of a High Court duly qualified for appointment as a Judge of the Supreme Court to be designated by the Chief Justice of India.

Description : Explain the waterfall model. Explain why it is more advantageous than adhoc methods.

Last Answer : Ans Waterfall Model: 1.The waterfall model is a sequential software development process, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of Conception, Initiation, ... approach. b. Iteration is not required. c. It is widely use because it is easy.

Description : How can I send an anonymous text message?

Last Answer : To send an anonymous text message, a website is usually needed. The message typed onto the computer and sent to the given number is converted from a text message to an SMS, and is then recieved by the other cell phone. http://www.sendanonymoustext.com/

Description : Which ad extension allows you to send traffic to different pages on your website? A. Structured snippet B. Call C. Sitelink D. Callout

Last Answer : C. Sitelink

Description : 2-What is the structured, systematic process that involves delivering electronic marketing messages directly to targeted subscribers known as? Choose one of the following: Exhibit: Mark one answer: Online marketing Mobile marketing Email marketing Subscriber marketing

Last Answer : Email marketing

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks

Last Answer : a) collision detection

Description : Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : b. One layer may duplicate lower layer functionality

Description : .Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : Functionality at one layer no way requires information from another layer

Description : A wireless network interface controller can work in _______ a) infrastructure mode b) ad-hoc mode c) both infrastructure mode and ad-hoc mode d) WDS mode

Last Answer : c) both infrastructure mode and ad-hoc mode

Description : Where can I send my eye glasses frames, and have RX lenses made and installed?

Last Answer : I have had lenses replaced in glasses that I’ve had, and I have taken frames into an optical store that sold the same line and had them make the lenses. I would not want to risk buying lenses online because of the fitting. If eyeglasses are not correct, you can get horrible headaches.

Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove

Last Answer : 7

Description : Which category of HDLC frames undergoes error and flow control mechanisms by comprising send and receive sequence numbers? a. Uframes b. Iframes c. Sframes d. All of the above

Last Answer : Sframes

Description : Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also ... memory were available? (A) 60 sec (B) 30 sec (C) 45 sec (D) 10 sec

Last Answer : Answer: C Explanation: T = Ninstr x 1µs + 15,000 x 2,000 µs = 60s Ninstr x 1µs = 60,000,000 µs - 30,000,000 µs = 30,000,000 µs Ninstr = 30,000,000 The number of instruction ... doesn't mean that the program runs twice as fast as on the first system. Here, the performance increase is of 25%.

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : Computers cannot communicate with each other directly over telephone lines because they usedigitalpulses whereas telephone lines useanalog sound frequencies. What is the name of the device which permits digital to analog ... A. Interface B. Modem C. Attenuation D. Teleprocessor E. None of the above

Last Answer : Modem

Description : _______is a structured programming language used for all purposes such as scientific application, commercial application, developing games etc. a) C b) C++ c) FORTRAN d) None of These

Last Answer : a) C

Description : Which of the following are not programming paradigms types: a) Object Oriented Programming b) Aspect Oriented Programming c) Session Oriented Programming d) Structured Programming e) None of These

Last Answer : c) Session Oriented Programming

Description : Find out the wrong one from the following: a) HTML 3 was developed in 1995 b) HTML 3.2 was next official version support for Tables, Images, Heading and other elements that is Align attributes etc. ... is current official standard version. d) None of These e) All of the Above f) None of These

Last Answer : f) None of These

Description : Page stealing 1) Is a sign of an efficient system 2) Is taking page frames from other working sets 3) Should be the tuning goal 4) Is taking larger disk spaces for pages paged out

Last Answer : 2) Is taking page frames from other working sets

Description : Page stealing 1 Is a sign of an efficient system 2 Is taking page frames from other working sets 3 Should be the tuning goal 4 Is taking larger disk spaces for pages paged out

Last Answer : 2 Is taking page frames from other working sets

Description : Breaking physical memory into fixed-sized bloclcs called as: (1) Packets (2) Page (3) Frames (4) Segments

Last Answer : Frames

Description : T-Mobile Family Plan Subscribers: Can other people on your plan send payments directly to T-Mobile?

Last Answer : answer:Yes, they will need to be set up as authorized users on the account. Anyway, anyone can get on the web page with the password. They will also accept payment from anyone they just need the account info.

Description : Are anonymous denunciations of other people's posts on social networking websites a good thing?

Last Answer : In the country I live in I am supposed to be able to face my accuser and demand they show cause for the charges. I know the originators of Facebook are Americans, but I think they may ... , I don't think they should taken seriously on Facebook and the Mods should weigh censorship very carefully.

Description : Are there any other good alcoholic rehab organizations besides Alcoholics Anonymous?

Last Answer : Yes, there are several other alternatives to Alcoholics Anonymous. Some of the most recognized alternatives are: LifeRing Secular Recovery, Moderation Management, Rational Recovery, Recovery, Inc., Secular Organizations for Sobriety (SOS), Smart Recovery, and also Women for Sobriety, Inc.

Description : B) CaixaBank Explanation: As per the agreement, they will expand banks guarantee transaction businesses by jointly providing credit to Indian-Spanish joint ventures and Indian local ... finance and export credit agency finance, infrastructure finance and networking services, among others.

Last Answer : Recently an Indian bank launched next generation features on its app „iMobile‟ which will enable customers to instantly pay taxes and book railway tickets within the app. Name the bank. A) Federal Bank B) Punjab National Bank C) Kotak Mahindra Bank D) ICICI Bank E) Bandhan Bank

Description : First Annual General Meeting of Asian Infrastructure Investment Bank held at A) Dhaka B) Jakarta C) Shanghai D) Beijing E) None of these

Last Answer : D) Beijing Explanation: Finance Minister Arun Jaitley Participated in the First Annual General Meeting of Asian Infrastructure Investment Bank at Beijing to discuss about the investment in Infrastructure and accorded the approval to establish the Regional Office of AIIB in New Delhi.

Description : The China-led Asian Infrastructure Investment Bank (AIIB) approved its first set of loans amounting to $ 509 million to four countries. Which of the following Is not among these 4 countries? A) Bangladesh B) Indonesia C) Pakistan D) Nepal E) Tajikistan

Last Answer : D) Nepal Explanation: AIIB headquartered in Beijing, China, has given loan to finance projects in four countries viz. Bangladesh, Pakistan, Indonesia and Tajikistan.

Description : For expanding access to banking services, the RBI has advised banks to open branches with minimum infrastructure support of 8 to 10BC units at a reasonable 3-4km. Such branches are known as _______ A. White Label ATMs B. Ultra Small Branches C. Banking Kiosks D. CBS Terminals E. ICT Hubs

Last Answer : B. Ultra Small Branches Explanation: Ultra Small Branches may be set up between the base branch and BC locations so as to provide support to about 8-10 BC Units at a reasonable distance ... for operating large customer transaction and would have to be managed full time by bank officers/ employees.

Description : Which of the following can issue Rupee denominated bonds? A. Real Estate Investment Trusts (REITs) B. Infrastructure Investment Trusts (InvITs) C. Limited Liability Partnerships D. Both (A) and (B) E. None of the Above

Last Answer : D. Both (A) and (B) Explanation: Any corporate (entity registered as a company under the Companies Act, 1956/ 2013) or body corporate (entity specially created out of a specific act ... like Limited Liability Partnerships and Partnership firms, etc. are also not eligible to issue these bonds.

Description : Infrastructure Finance Company (IFC) is a non-banking finance company has a minimum Net Owned Funds of _______ A. Rs.100 Crore B. Rs.200 Crore C. Rs.500 Crore D. Rs.300 Crore E. None of the Above

Last Answer : D. Rs.300 Crore Explanation: Infrastructure Finance Company (IFC) is a non-banking finance company has a minimum Net Owned Funds of Rs.300 Crore.

Description : .net domain is used for: a) educational institution b) Internet Infrastructure and Service Providers c) International Organizations d) None of These

Last Answer : b) Internet Infrastructure and Service Providers

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : What is the full form of NIV Foundation? a. Network Infrastructure Violation b. Network Issue Vulnerabilities c. Network Infrastructure Vulnerabilities d. Network Information Vulnerabilities

Last Answer : c. Network Infrastructure Vulnerabilities

Description : What is the full form of NIV Foundation? a. Network Infrastructure Violation b. Network Issue Vulnerabilities c. Network Infrastructure Vulnerabilities d. Network Information Vulnerabilities

Last Answer : c. Network Infrastructure Vulnerabilities

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : Which of the following are the foundation of all the technical security issues in your information systems? a. Network Infrastructure vulnerabilities b. Information vulnerabilities c. System Infrastructure vulnerabilities d. Network Information vulnerabilities

Last Answer : a. Network Infrastructure vulnerabilities

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : Answer. Option D.

Description : What type of ethical hack tests access to the physical infrastructure? ∙ A. Internal network ∙ B. Remote network ∙ C. External network ∙ D. Physical access

Last Answer : D. Physical access

Description : WIMAX stands for (1) Wireless Interoperability for Microwave Access (2) Wired Interoperability for Microwave Access (3) Worldwide Interoperability for Microwave Access (4) Worldwide Infrastructure for Microwave Access

Last Answer : Worldwide Interoperability for Microwave Access

Description : The nature of the entity refers to the following, except: a. The types of investments that it is making and plans to make. b. Other external factors, such as general economic conditions. c. The ... entity is structured and how it is financed. d. The entity's operations, its ownership, and governance

Last Answer : Other external factors, such as general economic conditions

Description : How would one squeeze more channels of communication into TDM frames of standard length? A. Shorten the time delay for each channel B. Raise the amplitude C. Add modulators D. Remove the synchronizing pulses

Last Answer : A. Shorten the time delay for each channel

Description : If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ______. a. 64 Kbps b. 32 Mbps c. 32 Kbps d. 64 MbpS

Last Answer : c. 32 Kbps

Description : A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ? a. 1 Mbps b. 2 Mbps c. 10 Mbps d. 12 Mbps

Last Answer : b. 2 Mbps

Description : A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network? a. 2 Mbps b. 60 Mbps c. 120 Mbps

Last Answer : a. 2 Mbps

Description : A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network ? (A) 2 Mbps (B) 60 Mbps (C) 120 Mbps (D) 10 Mbps

Last Answer : (A) 2 Mbps Explanation: In data transmission, throughput is the amount of data moved successfully from one place to another in a given period of time, and typically measured in bits per second (bps), ... second (Mbps) or gigabits per second (Gbps). Here, Throughput = 15000 x 8000/60 = 2 Mbps 

Description : If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ............... (A) 64 Kbps (B) 32 Mbps (C) 32 Kbps (D) 64 Mbps

Last Answer : (C) 32 Kbps

Description : A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ? (A) 1 Mbps (B) 2 Mbps (C) 10 Mbps (D) 12 Mbps

Last Answer : (B) 2 Mbps