FORTRAN? I remember typing out all those ridiculous punch cards in the 80's.
Wonder if anyone remembers dropping their big stack of punch cards and then
trying to put them back in order! :-)

Shawn K.

> -----Original Message-----
> From: The Long and Winding Road [SMTP:[EMAIL PROTECTED]]
> Sent: Thursday, January 02, 2003 9:37 PM
> To:   [EMAIL PROTECTED]
> Subject:      Re: CCIE Vs. BS or MS degree [7:59481]
> 
> ""Howard C. Berkowitz""  wrote in message
> [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> >     Characterize the major conceptual differences among the FORTH,
> FORTRAN
> 
> 
> if memory serves, FORTH requires that programmers be from another planet,
> or
> at least have spent substantial parts of their lives on one :)
> 
> 
> > IV,
> >       LISP, PROLOG, Pascal, C, Ada, C++ and SQL languages
> >     Give examples of data structures using isomorphism, homomorphism,
> and
> >       monomorphism.
> 
> >     What is the Bell-Lapadula theorem and where is it used?
> 
> I believe he was the star of several black and white vampire movies.
> 
> 
> >     What is the difference between spawning and forking?
> 
> 
> the difference between night and day?
> 
> 
> >     Discuss the evolution in Internet topology that has led to greater
> >       BGP instability?
> 
> 
> the accidental dissemination of proivilege exec passwords to tier 1 help
> desk CCNA's  :->
> 
> 
>  Focus on topological changes.
> >     Differentiate between codecs and transcoders, and identify the
> >       impairments they introduce.
> >     What limitation does the Dijkstra algorithm impose on subsecond
> > convergence
> >       time?  What are potential fixes to the problem?
> >     Define unicity distance and its applicability to two coding schemes.
> >     What is QAM?  Trellis encoding?
> >     What is the role of a phase-locked loop in received signal timing?
> >       To what sorts of signals is it relevant?
> >     Why are there pulse density restrictions in DS-x and E-x signals?
> >     In what routing protocol did Floyd identify the problem of weak
> >       synchronization, and how is it corrected?
> >     What is the effect of the Byzantine Generals (also called Byzantine
> >       Corruption) problem on high availability, and what are
> workarounds?
> >     What is van Eck radiation and how does it affect security?
> >     Why are external routes given lesser preference in link state
> protocols,
> >       and what is their effect on the Dijkstra algorithm?
> >     What is a LFN (elephant) and what do you do about it?
> >     Why does OSPF use the lollipop algorithm for sequence numbers?
> >     What is Huffman compression and how does it improve JPEG
> transmission?
> >     Why is regenerative feedback a bad method of controlling systems?
> >     Describe the functions of the OSI session layer in recovery.
> >     What is the limitation of source-destination hash load balancing in
> >       traffic engineering?
> >     What probability function best describes Internet traffic?
> >     Why does TFTP use a fixed record size?
> >     What are the differences between XDR and ASN.1?
> >     What mathematical principle underlies frame control sequences?
> >     Describe the silly window syndrome.
> >     Why has the destination preference attribute of BGP not been
> deployed?
> >     Differentiate among system, layer, and station management.
> >
> >
> 
> 
> Howard, you are one mean interviewer!!!!!!!!!!
> 
> I guess I'm not hired :->




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=60180&t=59481
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to