Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central location to subscribed devices?

A. Anycast
B. Unicast
C. CoS
D. QoS
E. Multicast


Answer: E. Multicast

Computer Science & Information Technology

You might also like to view...

What would happen if you do not override the hashcode() method?

a. The default hashcode() method would be used. Objects of such class would be inefficient as key values for the hash table or hash map data structure. b. Nothing. The hashcode() method doesn't need to be overridden. c. Objects of this class could not be used as hash map/hash table keys. d. A checked exception would be raised by the compiler.

Computer Science & Information Technology

________ access is useful for reentrant code because it allows a process to execute a segment or make its own copy of a segment which it may then modify.

a) Read/write b) Read/execute c) Write/execute d) Execute only

Computer Science & Information Technology

By selecting the ________ option, you can make sure that data entered into a related table first exists in the primary table

A) sort B) form wizard C) referential integrity D) query wizard

Computer Science & Information Technology

Define T1.

What will be an ideal response?

Computer Science & Information Technology