………… allows delivery of voice communications over IP networks. -Technology

1 Answer

Answer :

VoIP allows delivery of voice communications over IP networks.

Related questions

Description : What are Three important applications of data communications networks in business and personal use?

Last Answer : What is the answer ?

Description : MCI and AT&T are examples of whichof the following? A) Social networks B) Communications systems C) Internet service providers D) Mobisodes

Last Answer : Internet service providers

Description : What four switched networks are part of the defense communications system?

Last Answer : AUTOVON, AUTOSEVOCOM, AUTODIN, and DSSCS.

Description : ………………...is a minimal protocol that allows isolated hosts to link via TCP/IP over the telephone network and ………………..uses a proposed international standard for transmitting HDLC over asynchronous lines. A. LCP, PPP B. PPP, LCP C. SLIP, PPP D. PPP, SLIP

Last Answer : C. SLIP, PPP

Description : How many bits internet address isassigned to eachhost on a TCP/IP internet which is used in all communications withthehost? A. 16 - bits B. 32 - bits C. 48 - bits D. 64 - bits E. None of the above

Last Answer : 32 - bits

Description : State weather the following statement is true or false for Point-to-Point Protocol 1). It is still in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of asynchronous lines have long been ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : Voice over IP (VoIP), what should I look at?

Last Answer : Well I don't have a Voip service, but I use T-Mobile's UMA feature, which allows me to make calls over any Wi-Fi connection. The min I use over it come out of my monthly allotment, but if I ... also great as well, and you won't have to worry about reception like you would with a regular phone.

Description : Aside from the cable company and Vonage, which company would you recommend for voice over IP service?

Last Answer : answer:I recently got a Magic Jack account and it worked very well while i was on the road. My buddy doesn’t have a steady cell phone signal in his place and it works for him too. That’s all I’ve used other than vonage.

Description : DTP is a tool for graphic designers and non_designers to create visual communications for professional. DTP stands for (a) Device Transfer Protocol -Technology

Last Answer : (b) DTP stands for Desktop Publishing.

Description : How do you use iptables to route using private IP networks?

Last Answer : answer:You can use the ip route command or the route command to accomplish this assuming that the 10.0.5.0 network is attached to a separate interface from the 192.168 interface. The interfaces ... does. Frankly I prefer the ip command anyway, but I used route because it's more widespread.

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : What is IP class and number of sub- networks if the subnet mask is 255.224.0.0? a. Class A, 3 b. Class A, 8 c. Class B, 3 d. Class B, 32

Last Answer : b. Class A, 8

Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer

Last Answer : A. an application level , an IP level

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : The Federal Communications Commission (FCC) allows ______ kHz for each FM station. A) 20 B) 100 C) 200 D) none of the above

Last Answer : 100

Description : The Federal Communications Commission (FCC) allows ______kHz for each AM station. A) 5 B) 10 C) 20 D) none of the above

Last Answer : 0

Description : Which cable networks are used for LAN connections? -Technology

Last Answer : Twisted pair and fibre optic cables are used for LAN connection.

Description : Explain the given terms with respect to computer networks: 1. File and Data Sharing 2. Distributing Computing Power -Technology

Last Answer : 1. File and Data SharingAt a time, file-sharing consisted mostly of saving documents to floppy disks that could be physically transferred to other computers by hand. With networking, files can be shared ... to a network. Any user on the network can access the resources stored on the server.

Description : ………. is the formation of networks. -Technology

Last Answer : Networkingis the formation of networks.

Description : ……….. is called network of networks. -Technology

Last Answer : Internetis called network of networks.

Description : MAN’s are the computer networks confined to a localised area such as an office. -Technology

Last Answer : FalseLAN’s are the computer networks confined to a localised area such as an office.

Description : Explain in brief any 2 security threats to computer networks. -Technology

Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Description : Expand the following terms related to Computer Networks: a. SMTP b. POP c. FTP d. VoIP -Technology

Last Answer : a. SMTP: Simple Mail Transfer Protocolb. POP: Point to Point Protocolc. FTP: File Transfer Protocold. VoIP: Voice over Internet Protocol

Description : In telecommunications when we call data communications it means the transmission of________. A. Voice and video B. Voice C. Video D. Computer data

Last Answer : D. Computer data

Description : ECE Board Exam March 1996 One type of pulse communications system uses pulse that appear as a group, and which vary in number according to the loudness of the voice. This type of ... A. pulse duration modulation B. pulse amplitude modulation C. pulse code modulation D. pulse position modulation

Last Answer : A. pulse duration modulation

Description : ______ cable is used for voice and data communications. A) Coaxial B) Fiber-optic C) Twisted-pair D) none of the above

Last Answer : Twisted-pair

Description : ……….cable is used for voice and data communications. a. Twisted-pair b. None of These c. Coaxial d. Fiber-optic

Last Answer : a. Twisted-pair

Description : Why is the XOR problem exceptionally interesting to neural network researchers? a) Because it can be expressed in a way that allows you to use a neural network b) Because it is complex ... solved by a single layer perceptron d) Because it is the simplest linearly inseparable problem that exists.

Last Answer : d) Because it is the simplest linearly inseparable problem that exists.

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : This set of Artificial Intelligence MCQs focuses on Neural Networks - 2 . 1. Why is the XOR problem exceptionally interesting to neural network researchers? a) Because it can be expressed in ... by a single layer perceptron d) Because it is the simplest linearly inseparable problem that exists.

Last Answer : d) Because it is the simplest linearly inseparable problem that exists.

Description : Which tool allows a user to simulate real networks? a.artificial intelligence b.Packet Tracer c.internet d.PAN

Last Answer : b.Packet Tracer

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : middleware software stacks

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : virtual machines

Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : VOFR

Description : An IP address is a string of ……….. numbers separated by periods. -Technology

Last Answer : (b) An IP address consists of 4 numbers separated by periods.

Description : IP addresses are converted into (a) a binary string (b) alphanumeric string -Technology

Last Answer : (c) DNS translates domain names into their IP addresses and vice-versa.

Description : IP address is given to every computer for its unique identification. -Technology

Last Answer : True An IP address serves two principal functions:1. Host or network interface identification2. Location addressing

Description : FTP utilizes TCP/IP protocol suite. -Technology

Last Answer : True FTP is the easiest way to transfer files between computers via an Internet and utilizes TCP (Transmission Control Protocol)/IP (Internet Protocol) systems to perform uploading and downloading tasks.

Description : To display the details of all those students who have IP as their optional subject. -Technology

Last Answer : (i) select * from student where optional=‟IP‟;(ii) select name, stream, optional from student where name like 'A%';(iii) update student set average=average+3 where stream=‟Humanities‟ and optional='Maths';(iv) select name from student where average>75;

Description : Expand the following terms : 1. GSM 2. IP -Technology

Last Answer : Expanded form :(i) GSM – Global System for Mobile Communication(ii) IP- Internet Protoco

Description : Write one example each of URL and IP address. -Technology

Last Answer : Example of URL → http: // www. microsoft. com Example of IP address → 192.168.0.0

Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA

Last Answer : b. FTP

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above

Last Answer : best-effort delivery

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : The ……… protocol is based on end-to- end delivery. a. SMTP b. TCP c. IP d. SCTP

Last Answer : a. SMTP