""Howard C. Berkowitz"" wrote in message [EMAIL PROTECTED]">news:[EMAIL PROTECTED]... > Characterize the major conceptual differences among the FORTH, FORTRAN
if memory serves, FORTH requires that programmers be from another planet, or at least have spent substantial parts of their lives on one :) > IV, > LISP, PROLOG, Pascal, C, Ada, C++ and SQL languages > Give examples of data structures using isomorphism, homomorphism, and > monomorphism. > What is the Bell-Lapadula theorem and where is it used? I believe he was the star of several black and white vampire movies. > What is the difference between spawning and forking? the difference between night and day? > Discuss the evolution in Internet topology that has led to greater > BGP instability? the accidental dissemination of proivilege exec passwords to tier 1 help desk CCNA's :-> Focus on topological changes. > Differentiate between codecs and transcoders, and identify the > impairments they introduce. > What limitation does the Dijkstra algorithm impose on subsecond > convergence > time? What are potential fixes to the problem? > Define unicity distance and its applicability to two coding schemes. > What is QAM? Trellis encoding? > What is the role of a phase-locked loop in received signal timing? > To what sorts of signals is it relevant? > Why are there pulse density restrictions in DS-x and E-x signals? > In what routing protocol did Floyd identify the problem of weak > synchronization, and how is it corrected? > What is the effect of the Byzantine Generals (also called Byzantine > Corruption) problem on high availability, and what are workarounds? > What is van Eck radiation and how does it affect security? > Why are external routes given lesser preference in link state protocols, > and what is their effect on the Dijkstra algorithm? > What is a LFN (elephant) and what do you do about it? > Why does OSPF use the lollipop algorithm for sequence numbers? > What is Huffman compression and how does it improve JPEG transmission? > Why is regenerative feedback a bad method of controlling systems? > Describe the functions of the OSI session layer in recovery. > What is the limitation of source-destination hash load balancing in > traffic engineering? > What probability function best describes Internet traffic? > Why does TFTP use a fixed record size? > What are the differences between XDR and ASN.1? > What mathematical principle underlies frame control sequences? > Describe the silly window syndrome. > Why has the destination preference attribute of BGP not been deployed? > Differentiate among system, layer, and station management. > > Howard, you are one mean interviewer!!!!!!!!!! I guess I'm not hired :-> Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=60159&t=59481 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

