What is full form of MAC
a. Model Access Communication
b. Media Access Control
c. Multimedia Access Control
d. Modern Access Control

1 Answer

Answer :

b. Media Access Control

Related questions

Description : What is full form of MAC a. Model Access Communication b. Media Access Control c. Multimedia Access Control d. Modern Access Control

Last Answer : b. Media Access Control

Description : MAC is the abbreviation for: (A) Multimedia access control (B) Media access control (C) Mobile access control (D) Master access point control

Last Answer : (B) Media access control

Description : MAC address helps in (A) multimedia access control. (B) media access control. (C) mobile access control. (D) master access point control

Last Answer : (B) media access control.

Description : Media that exist in an interconnected series of communication – points are referred to as (A) Networked media (B) Connective media (C) Nodal media (D) Multimedia

Last Answer : Answer: A Ne twork media refers to digital media mainly used in computer networks such as the Internet. Network media is essentially driven by technological development, emerging from the internet ... as an input/output device. Network media requires a community to participate and consume. 

Description : _______ allows users to access accounts and pay bills (1) Distance Learning (2) Online Banking (3) E-Commerce (4) Multimedia

Last Answer : E-Commerce 

Description : What is MAC ? A computer made by Apple Memory address corruption Mediocre Apple Computer Media Access Control

Last Answer : Media Access Control

Description : Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs? a) IEEE 802.16 b) IEEE 802.3 c) IEEE 802.11 d) IEEE 802.15

Last Answer : c) IEEE 802.11

Description : Do you know of CMD or Communication and Multimedia Design?

Last Answer : No. I also don’t know of many art or design schools at all, except a couple that I have lived near to.

Description : The................. layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transport

Last Answer : B) Mac sub layer

Description : The ……………… layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transpor

Last Answer : B) Mac sub layer

Description : The rise of ___________ has led marketing to evolve away from a hierarchical one-sided mass communication model towards more participatory technologies (e.g. social channels and online communities). 1. Website 2. Social media 3. Web platform 4. Mobile App

Last Answer : Social media

Description : What is the full form of ADFM a. Abstract defining forensic model b. Abstract digital forensic model c. Abstract digital forensic media d. Analysis digital forensic mode

Last Answer : b. Abstract digital forensic model

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : What is Multimedia and Games Keyboard ?

Last Answer : Multimedia keyboard has some shortcut buttons for playing songs , movies etc. (such as play push , volume up and down etc.) and gaming keyboard has some extra features for playing games.

Description : What is Multimedia LCD Projector ?

Last Answer : The most advanced instrument used in the presentation is the multimedia LCD projector , which can be used to capture any subject in the form of video audio or slides on a large screen. This ... , the use of this modern instrument in the presentation of lessons in the classroom is widely observed.

Description : What is Multimedia ?

Last Answer : : The word multimedia literally means many mediums. So multimedia is an integrated system that creates a vibrant , vibrant and engaging world through the use of multiple media (such as text or ... video player for playing videos , and a variety of Flash animations that make the webpage attractive.

Description : Which type of software is most useful for the creation of brochures, posters and newsletters: a) Spread Sheet Framing Software b) Multimedia Authoring Software c) Web Authoring Software d) Desktop Publishing Software e) None of These

Last Answer : d) Desktop Publishing Software

Description : Multimedia refers to: a) Input for Entertainment b) Software of pictures, sounds and videos c) Output which is made up of pictures, sounds and videos d) None of These

Last Answer : c) Output which is made up of pictures, sounds and videos

Description : What is the most popular hardware for multimedia creations? a) PCs b) Minicomputers c) Mainframe Computers d) WANs e) Super Computers

Last Answer : a) PCs

Description : The software that allows users to surf the Internet is called a/an _____: a) Search Engine b) Internet Service Provider c) Multimedia Application d) Browser e) Internet Surfing Provider

Last Answer : d) Browser

Description : What is the name given to those applications that combine text, sound, graphics, motion video, and/or animation? a) Motionware b) Anigraphics c) Videoscapes d) Multimedia e) None of these

Last Answer : d) Multimedia

Description : Which of the following is a popular Programming Language for developing multimedia Web pages, Websites and web-Based applications? 1) COBOL 2) JAVA 3) ASSEMBLER 4) Nine of these

Last Answer : 2) JAVA

Description : Information in a combination of graphics, text, sound, video and animation is called (1) Multiprogram (2) Multifacet (3) Multimedia (4) Multiprocess

Last Answer : Multimedia

Description : Microsoft Power Point is a software designed to create (1) Internet browsers (2) Data bases (3) Text documents (4) Multimedia presentations

Last Answer : Multimedia presentations

Description : DMA stands for: a) Dial - Up Multiplier Access b) Digital Media Access c) Direct Memory Access d) None of These

Last Answer : c) Direct Memory Access

Description : When the content offers interactivity and users can control the progress of the content it is called as (a) Linear multimedia -Technology

Last Answer : (b) Non-linear multimedia uses interactivity to control progress, e.g. video games.

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions ? a. Session Maintenance Protocol b. Real - time Streaming Protocol c. Real - time Transport Control Protocol d. Session Initiation Protocol

Last Answer : d. Session Initiation Protocol

Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? (A) Session Maintenance Protocol (B) Real - time Streaming Protocol (C) Real - time Transport Control Protocol (D) Session Initiation Protocol

Last Answer : (D) Session Initiation Protocol

Description : he limitations in using publicity -based public relations tools stem primarily from the fact that A)publicity is never properly managed by media personnel. B)media personnel consider only unfavourable ... is newsworthy. D)media personnel control the content and the timing of the communication.

Last Answer : D)media personnel control the content and the timing of the communication.

Description : Is it just me or has your internet connection speed gone to hell since the FCC let the net neutrality lapse in favor of allowing the big media giants control access, connections and speed?

Last Answer : It’s probably you.

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer

Last Answer : b. media access control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : The portion of physical layer that interfaces with the media access control sublayer is called ___________ a. physical signalling sublayer b. physical data sublayer c. physical address sublayer d. physical transport sublayer

Last Answer : a. physical signalling sublayer

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer

Last Answer : B. media access control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : What is the attack called “evil twin”?  Rogue access point  ARP poisoning  Session hijacking  MAC spoofing

Last Answer :  MAC spoofing

Description : How to control access when "internet sharing" is enabled on my Mac?

Last Answer : From the help menu. Select how you want to share your Internet connection in the To computers using list. For example, if you want to share your Internet connection over AirPort, select ... your Internet connection using AirPort, click AirPort Options and give your network a name and password.

Description : The two sublayers of a Data Link layer are a. LLC Logical Link Control Layer b. MAC Medium Access Control Layer c. Both A and B d. Data Layer

Last Answer : c. Both A and B

Description : Modern style of marketing include ___________ 1. E-Commerce 2. E-mail solicitation 3. Social media marketing 4. All of these 5. None of these

Last Answer : All of these

Description : The subject of cybernetics deals with the science of A) Genetics B) Control and communication C) Molecular biology D) Biochemistry

Last Answer : Answer : B

Description : A digital multi meter is an example of an embedded system for A. Data communication B. Monitoring C. Control D. All of these

Last Answer : B. Monitoring

Description : The Command to access the memory or the I/O device is carried by ______ A. Address Bus B. Data Bus C. Control Bus D. None of the Above

Last Answer : C. Control Bus

Description : Access - control based on a person's fingerprints is an example of _____: a) Biometric Identification b) Characteristic Identification c) Characteristic Security d) Fingerprint Security e) Logitstics

Last Answer : a) Biometric Identification

Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : Which list is used in the authorization process A)Access Control List

Last Answer : A)Access Control List

Description : ACL stands for. a. Application Control Language b. Application Control list c. Access control List d. Access Command List

Last Answer : d. Access Command List