Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
the situation when both transmitter and receiver have to work in tandem is referred to asthe situation while both transmitter and receiver have to
telephone companies normally provide a voltage of to power telephonestelephone companies usually give a voltage of to power telephones -48 volts
for a non blocking crossbar configuration taking n as the number of subscribers there will be
echo suppressor is detrimental to full duplex operation becausethis disables one of the two pairs in a four-wire trunk line while a signal is
the number of point to point links required in a fully connected network for 50 entities isthe number of point to point links needed in a completely
how does tcpip decide the size of an ip fragment explaintcpip protocol utilizes the name ip datagram to refer to an internet packet the amount of
explain the technique used in the asymmetric key cryptographyasymmetric or public-key cryptography be different from conventional cryptography in
explain asymmetric cryptographyand its componentsasymmetric or public-key cryptography be different from conventional cryptography in which key
how many responses does a computer expect to receive when it broadcast an arp request whyan arp address resolution protocol request message is put in
why a computer expect to receive responses when it broadcast an arp requestresponse will be acquired only from the machine for that request is being
a router connects to at most k networks how many routers r are required to connect to n networks derive an equation that gives r in terms of n and
why does ethernet specify a minimum frame sizeethernet frame gives a minimum frame size of 46 bytes whereas a data field of zero byte is legal this
two computers using tdm take up turns to send 100-bytes packet over a shared channel that operates at 64000 bits per second the hardware takes 100
differentiate between wml-script and web-based scripting languageswml script is a lightweight procedural scripting language optimized for
discuss the main tags of wml tag definition of wireless markup languageltwmlgt ltwmlgtthis defines the starting and the ending of the page as lt html
discuss the life cycle of jspa jsp javaserver pages page services requests like a servlet therefore the life cycle and many of the abilities of jsp
what are the essential elements of electronic data interchangethe necessary elements of electronic data interchange edi are the use of an electronic
explain the term electronic data interchange edielectronic data interchange edi may be generally easy to understand as the replacement of paper-based
describe the electronic data exchange edi architecture in briefelectronic data interchange edi may be generally easy to understand as the replacement
can smtp be used as transfer protocol for web pages whysmtp is an easy mail transfer protocol this uses ascii text for all communications smtp needs
what functions connect and accept call in socket interfacingconnect system callclients use procedures connect to initiate connection with an exact
write notes on frame filtering techniquesframe filteringthe most valuable function performed through bridges is frame filtering a bridge doesnt
explain process control blockprocess control block pcb information related with every process is stored in process control blockaprocess state
how does tcp take of wrapping over of sequence numbersto handle out of instruct deliveries transport protocols utilize sequencing the sending side
why is fragmentation needed on internet not on a typical wantcpip protocol utilizes the name ip datagram to demote to an internet packet the amount