edited by
1,382 views
1 votes
1 votes

Match the following $:$

$\begin{array}{}  \text{} & \textbf{List – I} & & & \textbf{List – II} \\  \text{a.} & \text{Wireless Application Environment} &  & \text{i.} & \text{HTTP} \\  \text{b.} & \text{Wireless Transaction protocol} & & \text{ii.} & \text{IP} \\  \text{c.} & \text{Wireless Datagram Protocol} & &  \text{iii.} & \text{Scripts} \\  \text{d.} & \text{Wireless} & & \text{iv.} & \text{UDP}   \\  \end{array}$

$\textbf{Codes :}$

  1. $\text{a-ii, b-iv, c-i, d-iii}$
  2. $\text{a-iv, b-iii, c-ii, d-i}$
  3. $\text{a-iv, b-iii, c-i, d-ii}$
  4. $\text{a-iii, b-i, c-iv, d-ii}$
edited by

1 Answer

2 votes
2 votes
a. Wireless application: Full application can be made using scripts -->iii

b. Wireless transaction: HTTP is used for this -->i

c. Wireless datagram protocol --> UDP can be used for this

d. Wireless --> left over is IP
Answer:

Related questions

2 votes
2 votes
1 answer
1
1 votes
1 votes
1 answer
2
go_editor asked Jul 24, 2016
3,165 views
The VLF and LF bauds use _____ propagation for communicationGroundSkyLine of sightSpace
1 votes
1 votes
2 answers
4
go_editor asked Jul 24, 2016
1,947 views
Encryption and decryption is the responsibility of ____ LayerPhysicalNetworkApplicationDatalink