Answers:
Multimedia applications are loss tolerant - True
Reason: As few frame drops doesn't matter.
File transfer applications are delay tolerant - True
Reason: As there is no constraint on which a typical file must be recieved by the IP layer
Web documents are not time sensitive - True
Reason: As there is no constraint on which a typical file must be recieved by the IP layer therefore web documents are not time sensitive.
Email application can tolerate loss - False
Reason: Email applications cannot tolerate any amount of data losses.
Text messages need high bandwidth - True
Reason: Text messages requires high bandwidth for message transfer from one party to another.
True of false? Multimedia applications are loss tolerant File transfer applications are delay tolerant Web documents...
Which of the following applications is loss tolerant? a. Real-time audio b. web document c. file transfer d. e mail
Chapter 18: wireless networks TRUE OR FALSE T F 1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance on optical fiber and coaxial cable. T F 2. A BWA provider services one or more cells. T F 3. Wireless systems are more expensive than wired systems. T F 4. IEEE 802.16 and the associated WiMAX specification now deal with both fixed and mobile BWA. T F ...
21. App (application software) requires a member of transport services to function. Which choice best describes the transport service required by an app? a. Reliable data transfer and long delay in transmission b. Good throughput and data integrity c. Data secunty and long delay in transmission d. long delay in transmission and poor timing 22. This transport protocol does not provide flow control reliability, congestion control, time or security. Which transport protocol is it? a. File transfer protocol b. Transmission...
TRUE or FALSE next to each o True / False - Read e question each statement carefully. Write the entire word 19. A Combobox should be used when users need to select multiple items 20. Radiobutton controls in the same group box allow one selection to be clicked at a ti 21. Data provider classes in ADO NET facilitate communication with Databases in a list 22. Classes in the SystemDataSqClent namespace facilitate operablity with MSAcces 23. Data Reader classes facilitate...
The transfer characteristic curve plotted below is representing a n-channel E-MOSFET. Vos VGS(th) O True False Which among the following transistors is the most suited for high-speed and high-frequency applications? a. MOSFET b. BJT C. IGBT d. JFET For a device, the characteristic of the I-V curve is exhibited as below. - -VGS - a. BJT b. E-MOSFET c. D-MOSFET d. JFET In a JFET or MOSFET, the parameter of loss is denoting - a. drain to source current with...
True/False 1. Browser-based validation can replace the need to write custom JavaScript code to validate user input. 2. When you add a new property to an object that has been instantiated from a constructor function, the new property is available to all objects instantiated from the same constructor function. 3. Because objects in the browser object model are actually part of the web browser, you do not need to instantiate them in order to use them in your programs. 4....
1: Online analytical processing tools enable users to ________. A: extract textual information from Web documents B: group related records together based on having similar values for attributes C: analyze different dimensions of data beyond simple data summaries D: discover hidden predictive relationships in the data E: find associations or correlations among sets of items 2: Which of the following statements is true about an explicit knowledge asset? A: It reflects an individual's special knowledge about a new-to-the-world product. B:...
CHAPTER REVIEW QUESTIONS/EXERCISES True/False 1. True or False? In the corporate context, microblogging entails sendin 2. True or False? Popular devices like the iPad, Samsung Galaxy Android tablet 3. True or False? Quite a few risks need to be messages to apprise colleagues of recent developments in the dail y routine many types of smartphones are already capable of accessing company in customized intranet apps. resolved when approaching intranet security concerning mobile devices. True or False? Mobile devices accessing enterprise...
Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. A signed applet can be hijacked. The spiral model is an iterative model designed to enable the construction of increasingly complex versions of a project. The generation of a real random number is a trivial task. Buffer overflow is one of the most common web attack methodologies. Compilers create runtime code that can be executed via an interpreter engine, like a Java virtual machine (JVM),...
CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Question 58 + 66-70 (6 Questions) Question 58. Which among the following are the best practices for enhancing Disk FT? Select one or more: a. Verify hardware and firmware components b. Retain some un-allocated space c. Replace failed disk immediately d. Design complete FT storage pool Question 66. What are Group Policy Objects? Select one: a. Collection of settings that define what a system will look like and how it...