.NET Tutorials, Forums, Interview Questions And Answers
Welcome :Guest
 
Sign In
Register
 
Win Surprise Gifts!!!
Congratulations!!!


Top 5 Contributors of the Month
david stephan

Home >> Interview Question >> Networking >> Post New Question Subscribe to Interview Questions

Carrier Sensing Multiple Access / Collision Avoidance (CSMA/CA)?

Posted By :Shashi Ray     Posted Date :March 29, 2010    Points :10   Category :Networking 
1. Set of rules that can avoid collisions, unlike CSMA/CD that handles network transmissions once collisions are detected .

2. In CSMA/CA, all devices are forced to wait for a random number of time slots and sense the medium again.

3. If the medium is sensed to be busy, the device stops the timer until it becomes free again.

You can also find related Interview Question to Carrier Sensing Multiple Access / Collision Avoidance (CSMA/CA)?  below: 

Carrier Sense Multiple Access/ Collision Detection (CSMA/CD) ?

  
1. Permits one device to access to the network media at a time to avoid collision.

2. Networks using CSMA/CD technology such as Ethernet, network devices compete for the network media . (More...)

What is Active Directory? What is the namespace used to access the Microsoft Active Directories? What are ADSI Directories?

  
Active Directory Service Interfaces (ADSI) is a programmatic interface for Microsoft Windows Active Directory. It enables your applications to interact with diverse directories on a network, using a single interface. Visual Studio .NET and the .NET Framework make it easy to add ADSI functionality with the DirectoryEntry and DirectorySearcher components.

Using ADSI, you can create applications that perform common administrative tasks, such as backing up databases, accessing printers, and administering user accounts. (More...)

Can code inside multiple catch block be executed?

  
No, Code can not execute in mutiple catch block (More...)

Does C# support multiple inheritance?

  
No

C# does not support multiple inheritance. A class can inherit from maximum one base class, although it can implement any number of interfaces. Like Java, C# does not support multiple inheritance, meaning that classes cannot inherit from more than one class (More...)

What is CODE Access security?

  
CAS is part of .NET security model that determines whether or not a piece of code is allowed to run and what resources it can use while running. Example CAS will allow an application to read but not to write and delete a file or a resource from a folder. (More...)

Can we have multiple threads in one App domain ?

  
One or more threads run in an AppDomain. An AppDomain is a runtime representation of a logical process within a physical process. Each AppDomain is started with a single thread, but can create additional threads from any of its threads.
Note :- All threading classes are defined in System.Threading namespace. (More...)

If any .NET language has access to everything in the Base Class Library, why is there so much talk about C#?

  
Although in theory all .NET languages have equal access to the BCL, in reality it was left up to the language teams to determine what level of support they wanted to offer, at least beyond the minimums needed for basic compliance. In our opinion, C#, because it was developed as a new language specifically for the .NET platform, has the best support for .NET applications. (More...)

What is CODE Access security?

  
Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions.

It performs following function
1. Defines permissions and permission sets that represent the right to access various system resources.
2. Enables administrators to configure security policy by associating sets of permissions with groups of code (code groups).
3. Enables code to request the permissions it requires in order to run, as well as the permissions that would be useful to have, and specifies which permissions the code must never have.
4. Grants permissions to each assembly that is loaded, based on the permissions requested by the code and on the operations permitted by security policy.
5. Enables code to demand that its callers have specific permissions.
6. Enables code to demand that its callers possess a digital signature, thus allowing only callers from a particular organization or site to call the protected code.
7. Enforces restrictions on code at run time by comparing the granted permissions of every caller on the call stack to the permissions that callers must have. (More...)

How customizable is the user-to-user access in SHarePoint?

  
User permissions apply to an entire SharePoint Website, not to documents themselves. However, you can have additional sub webs that can optionally have their own permissions. Each user can be given any offer default roles. Additional roles can be defined by the administrator. (More...)

Can each user have access to their own calendar in a SharePoint Website?

  
Yes there are two ways to do this,
* by creating a calendar for each user, or
* by creating a calendar with a view for each user. (More...)

Is it possible to add multiple Machine.config file?

  
No, it is not possible to add more than 1 machine.config file. if we want to overwrite any setting than that can be achieve with the help of web.config. (More...)

Quick Links For Interview Questions Categories:
ASP.Net Windows Application   .NET Framework   C#   VB.Net   ADO.Net  
Sql Server   SharePoint   Silverlight   OOPs   JQuery   JavaScript/VBScript
Biztalk Patten/Practices .IIS WCF WPF WWF
Networking Aptitude Others   All      

Find questions, FAQ's and their answers related to .NET, C#, Vb.Net, Sql Server and many more.

 
Now you can find lots of .NET, C#, Vb.Net, SQL Server,Windows, ASP.Net related Questions and their Answers here at www.dotnetspark.com. Our aim is to help you pass your certification Exams (MCP, MCSD, MCAD etc.,) with flying scores and get good name in your company.

So, Start looking our Interview Question section daily and improve your .NET Skills. You can also help others by posting Interview Questions and their Answers in this section.


Hall of Fame    Twitter   Terms of Service    Privacy Policy    Contact Us    Archives   Tell A Friend