Which of the following technique is used for Time-To-Line (TTL)?
Options: a technique used in best-effort delivery system to avoid endlessly looping packets., a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame, One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size., All of the above
Options: Terminal section of a synchronous modem contains the scrambler, Receiver section of a synchronous modem contains the scrambler, Transmission section of a synchronous modem contains the scrambler, Control section of a synchronous modem contains the scrambler
The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband.
Options: Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel, Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable, Baseband refers to local area networks, and broadband refers to wide area networks., Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed
Options: The design of the screen the user will see and use to enter or display data
B. System analysis defines the format and type of data the program will use
C. System Analysis involves creating formal model of the problem to be solved
D. None of the above
Ans: – C
Which of the following is not used as secondary storage
Options: Semiconductor memory, Magnetic disks, Magnetic drums, Magnetic tapes
Options: is a value that is incremented whenever a dirty read occurs., is incremented whenever a deadlock occurs., is a value that keeps track of explicit locks., is a value that is incremented whenever database changes are made.