Answer Posted / fraud girls
my fate........
| Is This Answer Correct ? | 3 Yes | 15 No |
Post New Answer View All Answers
What are the different operation regions of the thyristor (scr)?
Define circuit turn off time
how many mobile subscriber are come under one BTS?? and how many BTS Comes under One BSC?? how many BSC under One MSC??
plz send me questions related to vlsi backend jobs....
what is a router how it woks? what is a compromised router in networks?how it works? what is a packet loss and packet dropping? what is a malicious packet?when it occurs?
whats the reason behind SF fault on siemens PLC.please explain in detail.
Explain why a voltmeter should be of very high resistance?
what is frame structher in SDH .
Guroscope works on the basis of what?
Explain why are the 2 input terminals of an op-amp are called as inverting & non-inverting terminals?
What Are The Various Types Of Numbers For Network Identity?
What is meant by lsb and msb?
Explain various types of antenna diversity.
In wave guides tem wave propagation is not exit, give the physical interpretation?
The server is already having the list of IP addresses of all its authorized clients & if any client is requesting the server to do a task, it is sending its IP address(encapsulated in the packet) to the server.The server can easily match that IP address with that on its list and check if it's authorized client or not, then why we need inverse domain...........