Question

True of false?  Multimedia applications are loss tolerant File transfer applications are delay tolerant Web documents...

True of false? 
Multimedia applications are loss tolerant
File transfer applications are delay tolerant
Web documents are not time sensitive
Email application can tolerate loss
Text messages need high bandwidth . .
0 0
Add a comment Improve this question Transcribed image text
✔ Recommended Answer
Answer #1

Answers:

Multimedia applications are loss tolerant - True

Reason: As few frame drops doesn't matter.

File transfer applications are delay tolerant - True

Reason: As there is no constraint on which a typical file must be recieved by the IP layer

Web documents are not time sensitive - True

Reason: As there is no constraint on which a typical file must be recieved by the IP layer therefore web documents are not time sensitive.

Email application can tolerate loss - False

Reason: Email applications cannot tolerate any amount of data losses.

Text messages need high bandwidth - True

Reason: Text messages requires high bandwidth for message transfer from one party to another.

Add a comment
Know the answer?
Add Answer to:
True of false?  Multimedia applications are loss tolerant File transfer applications are delay tolerant Web documents...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • Which of the following applications is loss tolerant? a. Real-time audio b. web document c. file...

    Which of the following applications is loss tolerant? a. Real-time audio b. web document c. file transfer d. e mail

  • Chapter 18: wireless networks TRUE OR FALSE                                    

    Chapter 18: wireless networks TRUE OR FALSE                                                                                                     T          F          1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance   on optical fiber and coaxial cable. T          F          2. A BWA provider services one or more cells. T          F          3. Wireless systems are more expensive than wired systems. T          F          4. IEEE 802.16 and the associated WiMAX specification now deal with      both fixed and mobile BWA. T          F         ...

  • 21. App (application software) requires a member of transport services to function. Which choice best describes...

    21. App (application software) requires a member of transport services to function. Which choice best describes the transport service required by an app? a. Reliable data transfer and long delay in transmission b. Good throughput and data integrity c. Data secunty and long delay in transmission d. long delay in transmission and poor timing 22. This transport protocol does not provide flow control reliability, congestion control, time or security. Which transport protocol is it? a. File transfer protocol b. Transmission...

  • TRUE or FALSE next to each o True / False - Read e question each statement...

    TRUE or FALSE next to each o True / False - Read e question each statement carefully. Write the entire word 19. A Combobox should be used when users need to select multiple items 20. Radiobutton controls in the same group box allow one selection to be clicked at a ti 21. Data provider classes in ADO NET facilitate communication with Databases in a list 22. Classes in the SystemDataSqClent namespace facilitate operablity with MSAcces 23. Data Reader classes facilitate...

  • The transfer characteristic curve plotted below is representing a n-channel E-MOSFET. Vos VGS(th) O True False...

    The transfer characteristic curve plotted below is representing a n-channel E-MOSFET. Vos VGS(th) O True False Which among the following transistors is the most suited for high-speed and high-frequency applications? a. MOSFET b. BJT C. IGBT d. JFET For a device, the characteristic of the I-V curve is exhibited as below. - -VGS - a. BJT b. E-MOSFET c. D-MOSFET d. JFET In a JFET or MOSFET, the parameter of loss is denoting - a. drain to source current with...

  • True/False 1. Browser-based validation can replace the need to write custom JavaScript code to validate user...

    True/False 1. Browser-based validation can replace the need to write custom JavaScript code to validate user input. 2. When you add a new property to an object that has been instantiated from a constructor function, the new property is available to all objects instantiated from the same constructor function. 3. Because objects in the browser object model are actually part of the web browser, you do not need to instantiate them in order to use them in your programs. 4....

  • 1: Online analytical processing tools enable users to ________. A: extract textual information from Web documents...

    1: Online analytical processing tools enable users to ________. A: extract textual information from Web documents B: group related records together based on having similar values for attributes C: analyze different dimensions of data beyond simple data summaries D: discover hidden predictive relationships in the data E: find associations or correlations among sets of items 2: Which of the following statements is true about an explicit knowledge asset? A: It reflects an individual's special knowledge about a new-to-the-world product. B:...

  • CHAPTER REVIEW QUESTIONS/EXERCISES True/False 1. True or False? In the corporate context, microblogging entails sendin 2....

    CHAPTER REVIEW QUESTIONS/EXERCISES True/False 1. True or False? In the corporate context, microblogging entails sendin 2. True or False? Popular devices like the iPad, Samsung Galaxy Android tablet 3. True or False? Quite a few risks need to be messages to apprise colleagues of recent developments in the dail y routine many types of smartphones are already capable of accessing company in customized intranet apps. resolved when approaching intranet security concerning mobile devices. True or False? Mobile devices accessing enterprise...

  • Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. ...

    Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. A signed applet can be hijacked. The spiral model is an iterative model designed to enable the construction of increasingly complex versions of a project. The generation of a real random number is a trivial task. Buffer overflow is one of the most common web attack methodologies. Compilers create runtime code that can be executed via an interpreter engine, like a Java virtual machine (JVM),...

  • CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Question 58 + 66-70 (6 Questions)...

    CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Question 58 + 66-70 (6 Questions) Question 58. Which among the following are the best practices for enhancing Disk FT? Select one or more: a. Verify hardware and firmware components b. Retain some un-allocated space c. Replace failed disk immediately d. Design complete FT storage pool Question 66. What are Group Policy Objects? Select one: a. Collection of settings that define what a system will look like and how it...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT