1) A 2MB PCM(pulse code modulation) has
31 voice channels & 1 signalling channel.
2) What is Buffering.
Buffering is the process of temporarily storing the data to allow for small variation in device speeds.
Buffering is the process of temporarily storing the data to allow for small variation in device speeds.
3) What is a terminal emulation.
A software that allows a personal computer to pretend as a computer terminal is called as terminal emulation.
A software that allows a personal computer to pretend as a computer terminal is called as terminal emulation.
4) What is the use of program counter.
A program counter is used to store address of next instruction to be executed.
A program counter is used to store address of next instruction to be executed.
5) What is the application of FTP.
File Transfer Protocol(FTP) is used to transfer files with user authentication.
File Transfer Protocol(FTP) is used to transfer files with user authentication.
6) Piggy backing is a technique used for
Acknowledgement.
Acknowledgement.
7) The 2’s complement of 10 is
10
Reason:
Transform 10 using NOT gate which means 01
Add by 1
01
+ 1
-----
10
-----
10
Reason:
Transform 10 using NOT gate which means 01
Add by 1
01
+ 1
-----
10
-----
8) Producer consumer problem is an example of
Semaphores
Semaphores
9) What is Agglomeration
Agglomeration is the process of grouping tasks in to larger tasks to improve performance.
Agglomeration is the process of grouping tasks in to larger tasks to improve performance.
10) Cycle stealing is a term related to
DMA(Direct Memory Access).
DMA(Direct Memory Access).
11) The logic family with least fanout is
RTL
RTL
12) IP is presented in which layer of OSI.
Network layer.
Network layer.
13) Context Free Languages are closed under
Union, Kleen, Closure.
Union, Kleen, Closure.
14) What is a self join.
A table joined within itself.
A table joined within itself.
15) What is meant by data mining.
Data Mining is the process of extracting previously non known valid and actionable information from large data to make crucial business and strategic decisions.
Data Mining is the process of extracting previously non known valid and actionable information from large data to make crucial business and strategic decisions.
16) Which error detection method uses one's complement arithmetic.
Checksum
Checksum
17) The maximum channel utilization in PURE ALOHA is
18%
18%
18) The maximum channel utilization SLOTTED ALOHA is
36%
36%
19) A mesh topology is characterized by
Highest reliability.
Highest reliability.
20) The flow of electrons in CRT is controlled by
Control grid
Control grid
No comments:
Post a Comment