Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
in tcp protocol header checksum is ofin protocol header of transfer control protocol checksum is of 16
hardware that calculates crc cyclic redundancy check useshardware which computes crc utilizes shift register and xor
fddi fiber distributed data interconnect is an example offiber distributed data interconnect is an illustration of token
the term byte stuffing refers tothe term byte stuffing consider as to data stuffing used along with character -oriented
unlike ipv4 ipv6 does not include which field in the base headerunlike ipv4 ipv6 does not contain the field for fragmentation information into the
address 1925483 belongs toaddress 1925483 belongs to class
let most segment of a name in dns representslest most segment of a name in dns shows individual
which layer is not present in tcpip modelpresentation layer is not present into transfer control protocolip
for what dmsp standsdmsp stans here for dist ributed mai l system
in 32bit ip addressing scheme all 1s representall 1s represent limited broadcast in 32 bit ip addressing
explain analysis and synthesis phase of a compilerthe synthesis and analysis phases of a compiler areanalysis phase in this breaks the source program
list one advantage and one disadvantage of having large block sizeans advantage by using a huge block of memory is maximum processs accommodation
suppose that a process scheduling algorithm favors those processes that have used the least processor time in the recent past why will this algorithm
explain the differences between paging and segmentationpaging and segmentationpagingsegmentationcomputer memory is separated into small partitions
explain the differences between internal and external fragmentationinternal and external fragmentation1 while memory allocated to a process is a
al l exceptions in java are subclasses of built in class calledeach exception in java are subclasses of make in class termed as
compare pre-emptive and non-preemptive scheduling policieswe preempt the currently executing process in preemptive scheduling in non-preemptive we
what criteria should be adopted for choosing type of file organizationselecting a file organization is a design decision therefore it must be done
explain macro definition and callmacro the assembly language programming frequently finds this necessary to repeat certain piece of code several
explain the term overlaysan overlay is an element of program that has the same load origin as several other part of the program these are used for
name the widely used language processor development tools lpdtswidely used language processor development tools arelex - a lexical analyzer
what are language processor development tools lpdtslpdt that is language processor development tools focuses upon generation of the analysis phase of
explain the features of major scheduling algorithmsthe features of major scheduling algorithms is given below fcfs - ie first come first served
differentiate between logical address and physical addressa logical address is the address of the data word or instruction as used by a program it