Line access and avoidance of collision are the main functions of: (A) the CPU (B) the monitor (C) network protocols (D) wide area networks 

1 Answer

Answer :

(C) network protocols

Related questions

Description : In IEEE 802.11, the ______ is a timerused for collision avoidance. A) NAV B) BSS C) ESS D) none of the above

Last Answer : NAV

Description : Anti-collision system is also known as ______ a) Collision Avoidance System b) Pre-crash System c) Collision Mitigation system d) Forward collision warning system e) All of the above

Last Answer : e) All of the above

Description : With reference to Traffic Collision Avoidance Systems, the difference between TCAS I and II is that: a. TCAS II can provide Traffic Advisories and Resolution Advisories whilst TCAS I can only provide Traffic ... C or Mode S. d. TCAS II can only be to aircraft which are equipped with EFIS

Last Answer : a. TCAS II can provide Traffic Advisories and Resolution Advisories whilst TCAS I can only provide Traffic Advisories

Description : With reference to Traffic Collision Avoidance Systems: a. RAs may be disregarded only when the pilot visually identifies the potentially conflicting traffic and decides that no deviation ... pilot visually identifies the potentially conflicting traffic and decides that no deviation is necessary

Last Answer : d. RAs may be disregarded only when the pilot visually identifies the potentially conflicting traffic and decides that no deviation is necessary

Description : Identify the important element a teacher has to take cognizance of while addressing students in a classroom. (A) Avoidance of proximity (B) Voice modulation (C) Repetitive pause (D) Fixed posture

Last Answer : (B) Voice modulation

Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : D. Link layer 

Description : Which one of the following is not a network device? (A) Router (B) Switch (C) Hub (D) CPU

Last Answer : Answer: D

Description : Which of the following correctly lists computer memory types from highest to lowest speed? (A) Secondary Storage: Main Memory (RAM); Cache. Memory; CPU Registers (B) CPU Registers; Cache Memory; ... (RAM); Secondary Storage (D) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage

Last Answer : Answer: C (CPU Registers > Cache Memory > Main Memory (RAM) > Secondary Storage)

Description : To prevent a head-on-collision of vehicles travelling in opposite directions along four-lane roads (A) Markings on the road are provided (B) Physical dividers are provided (C) Area dividers are provided (D) Medians of wide area are provided

Last Answer : Answer: Option D

Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above

Last Answer : d. All the above

Description : WAN is a most used abbreviation in Networking, what is its full form? A) WAP Area Network B) Wide Area Network C) Wide Array of Network D) Wireless Access Network

Last Answer : Answer : B

Description : WAN stands for: a) WAP Access Network b) Wireless Area Network c) Wide Area Network d) None of These

Last Answer : c) Wide Area Network

Description : What is the full form of WLAN? a) Wide Local Area Network b) Wireless Local Area Network c) Wireless Land Access Network d) Wireless Local Area Node

Last Answer : b) Wireless Local Area Network

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks

Last Answer : a) collision detection

Description : The concept of connect intelligence is derived from: (A) virtual reality (B) fuzzy logic (C) bluetooth technology (D) value added networks

Last Answer : (D) value added networks

Description : For purposes of routing, the Internet isdivided into ___________. A) wide area networks B) autonomous networks C) autonomous systems D) none of the above

Last Answer : autonomous systems

Description : In most Wide Area Networks, the subnet consists of two distinct components: which are they? A. Transmission Lines and Switching Elements. B. host and subnet C. Transmission Lines and host D. subnet and Switching Elements.

Last Answer : A. Transmission Lines and Switching Elements.

Description : What do wide area networks provide for?

Last Answer : Global connections.

Description : Where does a computer add and compare its data? (A) CPU (B) Memory (C) Hard disk (D) Floppy disk

Last Answer : (A) CPU

Description : Which part of the Central Processing Unit (CPU) performs calculation and makes decisions: (A) Arithmetic Logic Unit (B) Alternating Logic Unit (C) Alternate Local Unit (D) American Logic Unit

Last Answer : (A) Arithmetic Logic Unit

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : The unit of hardware, which an operator uses to monitor computer processing, is the 1) Card Reader 2) CPU 3) Line Printer 4) Console

Last Answer : 4) Console

Description : Not far outside the town of Pottsville, a railroad track runs through a tunnel in a hillside. There's only one track, and the tunnel is wide enough for only one train. But one day, two trains ... out at the opposite ends of the tunnel. Yet, there was no collision! How was this possible? -Riddles

Last Answer : One train comes at 8am and the other train came at 8pm.

Description : The software used to navigate through the web is known as (A) Website (B) Web Browser (C) Internet (D) World Wide Web

Last Answer : Answer: B

Description : The first Web Browser is (A) Internet Explorer (B) Netscape (C) World Wide Web (D) Firefox

Last Answer : (C) World Wide Web

Description : Which among the following gives more freedom to the learner to interact? (A) Use of film (B) Small group discussion (C) Lectures by experts (D) Viewing country-wide classroom programme on TV

Last Answer : (B) Small group discussion

Description : www represents: (A) who what and where (B) weird wide web (C) word wide web (D) world wide web

Last Answer : (D) world wide web

Description : Which of the following is not an input device? (A) Microphone (B) Keyboard (C) Joystick (D) Monitor

Last Answer : Answer: D

Description : Which of the following is not an output device? (A) Keyboard (B) Printer (C) Speaker (D) Monitor

Last Answer : (A) Keyboard

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : In an Ethernet local area network, which one of the following statements is TRUE ? a. A station stops to sense the channel once it starts transmitting a frame. b. The purpose ... collision is detected. d. The exponential backoff mechanism reduces the probability of collision on retransmissions

Last Answer : The exponential backoff mechanism reduces the probability of collision on retransmissions

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : What is true about FIDM? A. FIDM describes the technologies and protocols B. It uses Security Markup Language (SAML) to package a user's security credentials C. SAML has access control D. All of the above

Last Answer : All of the above

Description : Explain the terms topology and access methods used in LANs. Discuss the CSMA/CD and CSMA/CA protocols.

Last Answer : (i) LAN topologies: Network topology is a physical schematic which shows interconnection of the many users. There are four basic topologies as under:  (a) Direct Connection or one to all ... it is free, the station transmits, and waits for an acknowledgment signal that the packet was received

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called a. Preamble b. Postamble c. Jam d. None of the above

Last Answer : c. Jam

Description : The National Disaster Management Authority functions under the Union Ministry of (A) Environment (B) Water Resources (C) Home Affairs (D) Defence

Last Answer : (C) Home Affairs

Description : Which of the following statements are correct about distance education in India ? (a) It supplements formal education. (b) It reduces the cost of education.+ (c) It replaces the formal education. (d) It enhances access to education. ... ) and (d) (C) (a), (b) and (d) (D) (b), (c) and (d)

Last Answer : Answer: C

Description : Random Access Memory (RAM), a form of computer storage, is a ............. memory. (A) Non-volatile (B) Volatile (C) Permanent (D) Secondary

Last Answer : Answer: B

Description : What is required to ensure competitive advantages in specific markets? (A) Access to capital (B) Common office buildings (C) Superior knowledge (D) Common metals

Last Answer : (C) Superior knowledge