A. Loss-tolerant application
B. Bandwidth-sensitive application
C. Elastic application
D. None of these
Related Mcqs:
- When sending an e-mail, the ________________ line describes the contents of the message ?
A. cc
B. contents
C. to
D. subject - Which one of the following protocol delivers/stores mail to reciever server ?
A. simple mail transfer protocol
B. post office protocol
C. internet mail access protocol
D. hypertext transfer protocol - What is the term used for unsolicited mail ?
A. Spam
B. Surrogate
C. Use Net
D. Flaming - The most powerful computer is_____________________?
A. Super computer
B. Micro computer
C. Mini computer
D. All of these - Any data and instruction entered in the memory of a computer is_____________________?
A. Storage
B. Output
C. Input
D. Information - The proper definition of a modern digital computer is_____________________?
A. an electronic automated machine that can solve problems involving words and numbers
B. a more sophisticated and modified electronic pocket calculator
C. any machine that can perform mathematical operations
D. a machine that works on binary code - A software package to implement a data base is_____________________?
A. System analysis
B. DBMS
C. Database
D. DASD - Sending data from one place to another, by physical or electronic means is_____________________?
A. E-mail
B. Internet
C. Data transmission
D. Distributed processing - Which transmission media has the highest transmission speed in a network ?
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable - The intersection of a column and row in a spreadsheet is called a bon or ____________________?
A. Cell
B. Key
C. Menu
D. Field