Answer:
Survey data are collected by using all of these methods except Field Research.
Explanation:
In field research data has been gathered from different experiments, qualitative analysis and observations of any event.
On the other hand, survey data can be collected from Following:
<u>structured interview</u><u>:</u>
where data can be gathered by interviews and analyzed it on quantitative basis.
<u>Face to face questionnaires:</u>
Data has been collected by asking questions directly from users in the form of interview.
<u>self-administered questionnaires</u>
In this research, questionnaire has been designed to asked question related to some topic without conducting interview.
Answer:
We learned that an ideal multiple access protocol has FOUR desirable
characteristics, describe them.
Explanation:
1.- Very experienced technology and easy to implement.
2.- Rigid resource management and unfit for variable traffic flows.
3.- Requires antenna duplexer for duplex transmission.
<u>Duplex</u> <em>is a term used in telecommunication to define a system that is capable of maintaining two-way communication, sending and receiving messages simultaneously.
</em>
4.- Normally FDMA is combined with multiplexing FDD.
<u>FDMA</u> (acronym in English for Frequency Division Multiple Access) <em>is a multiplexing technique used in multiple communication protocols, both digital and analog, mainly radio frequency, and among them in mobile phones of GSM networks.
</em>
<u>FDD</u> (Frequency Division Duplexing in English) <em>designates a duplex method in the environment of wireless telecommunications and over certain wired networks.</em>
Answer:
Thank you for the free points.
Answer:
Application Software Type Examples
Word processing software MS Word, WordPad and Notepad
Database software Oracle, MS Access etc
Spreadsheet software Apple Numbers, Microsoft Excel
Multimedia software Real Player, Media Player
Presentation Software Microsoft Power Point, Keynotes
Explanation:
Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.