Question 6: Briefly explain what is recoverability and what is cascade freedom. Mention a protocol that ensures both properties, and explain why it ensures both the above properties.
Question 6: Briefly explain what is recoverability and what is cascade freedom. Mention a protocol that...
Briefly explain what happens to the shape of the t-distribution as the degrees of freedom approach infinity.
Explain briefly why cellulose and starch have such different properties even though they are both polymers of hexose sugars
Question C1. Give two (2) ways in which you can increase the yield strength of a metal and briefly explain how each works to increase the yield stress. Question C2. An aluminium-Silicon casting alloy has a composition that is close to the Al-Si eutectic composition. Give two reasons why this composition is used to cast aluminium based engine blocks Question C3. Describe briefly three (3) mechanisms by which short randomly aligned fibres add to the toughness of a composite. can...
1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol (WEP) B) Wireless Application Protocol (WAP) C) Wired Equivalent Privacy (WEP) D) Wireless Session Protocol (WSP) 2) Consider 802.11 shared key authentication. Which of the following statements is false? Explain. A) If a device with the key is lost then the security for the entire WLAN is compromised. B) 802.1X requires shared key authentication. C) Real users and attackers with a shared WEP key...
What is the Border Gateway Protocol (BGP)? Why is it needed? Explain how it works.
Question 3 (25 points): 1) (1pt) Explain briefly and in your own words why collision is an issue in random access protocols but not in controlled access protocols. 2) (2pts) Explain briefly and in your own words why collision is an issue in random access protocols but not in channelization protocols. 3) (2pts) What happens if there is a collision during the handshaking period? 4) (5pts) Give 2 reasons that CSMA/CD cannot be used in a wireless LAN? 5) (5pts)...
In 200 words or more Briefly review the development of TCP/IP, IPv4 and IPv6: Explain how the TCP/IP protocol works? What is IPv4? What is IPv6? What led to the development of the two standards; IPv4 and IPv6? Why are networking standards necessary and who is responsible for their development? Do you agree?
3. (a) Explain what you understand by the concept autocorrelation in the context of regression analysis mention the possible causes. and (b) Describe using standard notations, a simple linear regression model in which it is known that a first order autocorrelation is present. (c) For the model in (b) above, obtain a general term for the model error and comment on the (i) first moment (ii) second moment and (iii) autocovariance 3. (a) Explain what you understand by the concept...
7. Question A Transmission Control Protocol (TCP) connection is in working order and both sides can send each other data. What is the TCP socket state? SYN_SENT ESTABLISHED SYN_RECEIVED LISTEN8. Question Which field in a Transmission Control Protocol (TCP) header provides the next expected segment? Sequence number Data offset Checksum Acknowledgement number9. Question Which field in a Transmission Control Protocol (TCP) header is not typically used in modern networking? Acknowledgement number Urgent pointer Sequence number Checksum11. Question In what order will the Transmission Control Protocol (TCP) generally send all segments? Largest to smallest Prioritized Random Sequential12. Question...
) Consider what happens with the locks in order to get each of the following SQL isolation levels: (a) READ UNCOMMITTED (b) READ COMMITTED (c) REPEATABLE READ (d) SERIALIZABLE For each of the above, you have to (i) briefly explain what ”locking policies” the DBMS enforces to get that isolation level. (ii) briefly explain why this locking policy ensures that particular isolation level (iii) briefly explain why this locking policy does not ensure the next isolation level. (you don’t have...