Ans : Carbon accounting is the practice of making scientifically robust and verifiablemeasurements of GHG emissions. Forests play an important role in the global carbonbalance. Accounting for the carbon within forest ecosystems and changes in carbonstocks resulting from human activities Read More …
Author: ignougroup
Ques : What is Forensic Accounting ?
Ans : Forensic Accounting is an art of investigation over accounting records, financialstatements, and other related financial records. The result of the investigation ismostly used for legal support and resolving conflict. This job requires technical skillsin accounting, investigation, and legal. Read More …
Ques : Describe Components of cash flow statement
Ans : A cash flow statement is divided into 3 sections. Each head signifies the source fromwhich a company can make money. A positive cash flow indicates cash inflows,whereas a negative cash flow indicates cash outflows.Cash Flow Statement is basedon Read More …
Ques : What is Dynamic host configuration protocol
Ans : Dynamic Host Configuration Protocol (DHCP) is a network managementprotocol. For a network with large number of IP based systems (Systemsassigned an IP address) it is almost impractical to assign IP addressesmanually. To automate this process Dynamic Host Configuration Read More …
Ques : Describe Internet control message protocol
Ans : Internet control message protocol (ICMP) is a network layer protocol. SinceInternet Protocol(IP) does not have a built-in mechanism for sending errorand control messages, a separate protocol namely: ICMP is used to supporterror control. It is responsible to report Read More …
Ques : What is Time To Live (TTL) ?
Ans : Under some circumstances many of the times packets got stuck in loops in thenetwork and consumes the bandwidth of the network unnecessarily. The sizeof this field is 8 bit. This field restricts packets to enter to live infinitely Read More …
Ques : What is Private networks ?
Ans : Private IP addresses are used in private networks managed by single authority.Private IP addresses are reusable among private networks i.e. private IPaddress used in one private network can be reused in another private network.Private IP addresses are not Read More …
Ques : Describe Operation of Bridges in Different LAN Environment
Ans : Having studied the features of bridges and why we require multiple LANs, let’s learnhow they work. Assume that, there are two machines A and B. Both of them areattached to a different LANs. Machine A is on a Read More …
Ques : Describe Security Measures and solutions
Ans : As discussed on 3.3 which deal with security requirements, it has been stated that the conceptof CIA is very important. Further, security threats are inventive according to the newinformation technology launched. These security threats constantly evolve and are Read More …
Ques : Describe Software Metrices
Ans : Measurement is fundamental to any engineering discipline and software engineeringis no exception. Software metric is a quantitative measure derived from the attributeof software development life cycle [Fanton and Kaposi, 1987]. It behaves as softwaremeasures. A software measure is Read More …