Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here
Sign InSign Up

SIKSHAPATH

SIKSHAPATH Navigation

  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Search
Ask A Question

Mobile menu

Close
Ask A Question
  • Home
  • Questions
  • Blog
    • Computer Science(CSE)
    • NPTEL
    • Startup
  • Shop
    • Internshala Answers
Home/Other/Page 18

SIKSHAPATH Latest Questions

Pavanagg
  • 0
Pavanagg
Asked: April 2, 2022In: Other

Which of the following could be the terminating criteria in pre-copy phase? a. The number of rounds exceeds a threshold …

  • 0

Which of the following could be the terminating criteria in pre-copy phase? a. The number of rounds exceeds a threshold b. The total memory transmitted exceeds a threshold c. The number of dirtied pages in the previous round drops ...

cloud computing
  • 1 Answer
  • 218 Views
Answer
Pavanagg
  • 0
Pavanagg
Asked: April 2, 2022In: Other

Program execution does not get affected by the cold VM migration process. The above statement is: a. True b. False

  • 0

Program execution does not get affected by the cold VM migration process. The above statement is: a. True b. False

cloud computing
  • 1 Answer
  • 483 Views
Answer
Pavanagg
  • 0
Pavanagg
Asked: April 2, 2022In: Other

Which of the following statement(s) is/are false for side channel attacks? a. They exploit weaknesses in cryptographic algorithms. b. They …

  • 0

Which of the following statement(s) is/are false for side channel attacks? a. They exploit weaknesses in cryptographic algorithms. b. They exploit weaknesses in algorithm implementations. c. They do not require physical access to the device. d. None of these.

ethical hacking
  • 1 Answer
  • 407 Views
Answer
Pavanagg
  • 0
Pavanagg
Asked: April 2, 2022In: Other

Which of the following are examples of hardware-based attacks? a. Side-channel attack. b. Physical probing. c. Denial of service stack. …

  • 0

Which of the following are examples of hardware-based attacks? a. Side-channel attack. b. Physical probing. c. Denial of service stack. d. SQL injection attack

ethical hacking
  • 1 Answer
  • 753 Views
Answer
Tushar
  • 3
Tushar
Asked: April 1, 2022In: Other

Consider two network layer devices, one operating at network layer and the other operating at data link layer. In very …

  • 3

Consider two network layer devices, one operating at network layer and the other operating at data link layer. In very generic terms, which one is more intelligent? Explain with example

  • 1 Answer
  • 1k Views
Answer
Tushar
  • 1
Tushar
Asked: April 1, 2022In: Other

Suppose that the sender wants to send 4 frames each of 8 bits, where the frames are 11001100, 10101010, 11110000 …

  • 1

Suppose that the sender wants to send 4 frames each of 8 bits, where the frames are 11001100, 10101010, 11110000 and 11000011. Check error using error detection checksum method.

  • 1 Answer
  • 1k Views
Answer
1 … 17 18 19 … 38

Sidebar

store ads

Stats

  • Questions 1k
  • Answers 1k
  • Posts 141
  • Best Answers 89
  • Cloud Computing Notes 101: Learn Fundamentals, Service Models, and Virtualization!
  • This Free AI Tool Translates Entire Books in Minute !
  • 25 Essential Software Testing Questions: Flashcard Edition!
  • 27 C++ Questions & Answers – Quiz 1 Flashcards
  • Interactive Alphabet Flashcards for Kids: A to Z Learning Fun!

Explore

  • Recent Questions
  • Questions For You
  • Answers With Time
  • Most Visited
  • New Questions
  • Recent Questions With Time

Footer

SIKSHAPATH

Helpful Links

  • Contact
  • Disclaimer
  • Privacy Policy Notice
  • TERMS OF USE
  • FAQs
  • Refund/Cancellation Policy
  • Delivery Policy for Sikshapath

Follow Us

© 2021-24 Sikshapath. All Rights Reserved