glowdemo.blogg.se

Each of the following is a name for the media access control (mac) address except
Each of the following is a name for the media access control (mac) address except




each of the following is a name for the media access control (mac) address except
  1. #Each of the following is a name for the media access control (mac) address except software#
  2. #Each of the following is a name for the media access control (mac) address except code#
  3. #Each of the following is a name for the media access control (mac) address except Bluetooth#

#Each of the following is a name for the media access control (mac) address except Bluetooth#

Bluetooth is only used for relatively short distances, like a few metres. Devices such as mobile phones, laptops, PCs, printers, digital cameras and video game consoles can connect to each other, and exchange information. It was developed in the 1990s, to reduce the number of cables. Q: Bluetooth is a long-range wireless technology and is a low cost means of data transfer.Īnswer: P only As Bluetooth is a protocol for wireless communication over short distances. P: Bluetooth is a wireless technology which can be used to connect a headset to a mobile phone. Which of the following statements(s) is/are true in respect of wireless technology?

#Each of the following is a name for the media access control (mac) address except code#

For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should he or she ever be terminated from the company.

#Each of the following is a name for the media access control (mac) address except software#

Will set off a malicious function when specified conditions are met?Īnswer: A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. Which of the following is a type of malware intentionally inserted into a software system that (4) An OS controls the processor and peripherals and allows the user to connect to the internetĪnswer: Options look confusing however ans given was 3. (3) An OS controls peripheral, and allocates memory and processor time. (2) An OS provides protection against viruses and controls peripherals. (1) An OS controls peripheral, allocates memory and organises data into fields and records. Select the true statement about an operating system (OS)?

each of the following is a name for the media access control (mac) address except

Questions based on NTA UGC NET EXAM JUNE 2019(Memory-Based)

  • A byte is a binary number consisting of exactly 8 bits.
  • the next integer P would be represented as 01101
  • For the sequence of integers represented in binary as 00111, 01001, 01011, P….
  • which of the following statements is/are correct? Select the option that includes file formats suitable for distributing sound files across the internet. Text used by web browsers to locate a web address on the Internet.Īnswer: 2 #3.

    each of the following is a name for the media access control (mac) address except

    Most appropriate to connect computers in a small building Makes use of light pulses to transmit data Match List-I with List-II in the context of computer networking: List-I W hich of the following is/are major issues arising out of the growing reliance on information technology?Īnswer: 3 #2. Questions based on NTA UGC NET EXAM DEC 2019 #1. Clock rate of CPU is measured in GigabytesĬhoose the correct answer from the options given below: National Supercomputing Mission is a Government of India initiativeĭ. Which of the following statements are correct?Ī. Statement II: Formative assessment provides support to enhancing the quality of teaching-learning sessions Statement I: The use of ICT in organizing teaching-learning programmes in the universities has the potential to optimise the learning outcomes Which one of the following is NOT a web browser? Statement I is incorrect but Statement II is correct Statement I is correct but Statement II is incorrectĤ. Both Statement I and Statement II are incorrectģ. Both Statement I and Statement II are correctĢ. In light of the above statements, choose the most appropriate answer from the options given belowġ. Statement II: Random access memory is closer to the processor than cache memory Statement I: Cache memory is faster than random access memory






    Each of the following is a name for the media access control (mac) address except