Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain Frequency-division multiplexing?
Frequency-division multiplexing (FDM) is a technique for data transmission widely used in telephone, radio, and cable TV systems in which the transmission frequency spectrum (i.e., bandwidth) is divided into smaller bands known as subchannels.
Data transmission between two stations can be achieved in either simplex, half-duplex, or full-duplex mode. In a simplexmode,mainly used in radio and TV broadcasts, information travels only in one direction. Thismode is rarely used in data communications. In half-duplexmode, used by radio communications, information may travel in both directions, but only in one direction at a time. The transmitter becomes the receiver and vice versa. In a full-duplex mode, information may travel in both directions simultaneously. This mode, used in telephone systems, adopts two different carrier frequencies.
The excess 3 code of decimal number 26 is ? Ans. (26) 10 in BCD is (00100110) BCD Add 011 to all BCD 01011001 for excess - 3
What is the window of the working set of a process? The window of the working set of a method is the total number in which the method had referred the set of pages in the work
The reason is, LINQ is used with C# or other programming languages, which needs all the variables to be declared first. From clause of LINQ query just describes the range or condit
What is link destruction? Link destruction is inverse of link creation. When a link is destroyed makes sure the associated objects accessible by other handles or intentionally
Backpropagation: However Backpropagation can be seen as utilising searching a space of network configurations as weights in order to find a configuration with the least error,
Q. Describe the basic aspects of ENIAC? The main aspects of ENIAC can be summarized as: ENIAC was a general purpose-computing machine in that vacuum tube technology was
What is independent process? A process is independent it cannot affect or be affected by the other processes implementing in the system. Any process does not share data with ot
How many address bits are required to represent a 32 K memory ? Ans. 32K = 25 x 210 = 215, Hence 15 address bits are needed; Only 16 bits can address this.
Explain the use of SSL to secure the network. SSL (Secure Sockets Layer) is a protocol developed by Netscape for transferring private documents by the Internet. SSL works by u
The term 'page traffic' describes? Ans. Page Traffic describes the movement of pages in and out of memory.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd