Remember
Register
1
new
Chill
new
Puzzles
new
GK
new
Sports
new
Business
Home
Questions
MCQs
Unanswered
Tags
Users
Ask a Question
Write Article
Articles
Connect to us
Most popular tags
lte
interview questions
ue
java
c
enodeb
5g
informatica
sql
linux
php
freshers
oracle
c++
python
data structures
mac
android
asp.net
nr
Recent questions without an upvoted answer
No answer
No selected answer
No upvoted answer
+2
votes
3
answers
LTE Basics: Is only Radio Interface the one which is non-wired rest everything is connected through wire?
posted
Dec 17, 2014
by
anonymous
lte
enodeb
+1
vote
1
answer
What is pulse amplitude modulation?
posted
Dec 17, 2014
by
Vrije Mani Upadhyay
network security
+1
vote
1
answer
What is Nyquist bit rate formula?
posted
Dec 17, 2014
by
Vrije Mani Upadhyay
network security
+3
votes
1
answer
What are the factors on which data rate depends?
posted
Dec 17, 2014
by
Vrije Mani Upadhyay
network security
+1
vote
1
answer
What is Relay Node architecture's A and B?please explain in detail?
posted
Dec 17, 2014
by
Gnanendra Reddy
lte
relay
0
votes
1
answer
What is direct tunneling in LTE and when it is used?
posted
Dec 17, 2014
by
anonymous
lte
+1
vote
1
answer
What is X2-based handover with Serving GW relocation in LTE?
posted
Dec 16, 2014
by
Gnanendra Reddy
lte
handover
enodeb
+4
votes
1
answer
What is Inter LTE Handover in X2AP?
posted
Dec 16, 2014
by
Gnanendra Reddy
lte
enodeb
handover
0
votes
1
answer
what is difference between X:Name vs Name:?
posted
Dec 16, 2014
by
Saravanan
windows phone 8 app
+1
vote
1
answer
X:key vs X:Class vs X:Name
posted
Dec 16, 2014
by
Saravanan
windows phone 8 app
0
votes
1
answer
Windows Phone apps vs Windows store apps
posted
Dec 16, 2014
by
Saravanan
windows phone 8 app
+1
vote
1
answer
What is the use of Control files in Oracle?
posted
Dec 16, 2014
by
Vidhya Sagar
oracle
sql
+2
votes
1
answer
Early Binding and Late Binding with Example & Difference b/w Early & Late Binding
posted
Dec 16, 2014
by
Sathaybama
c#
+1
vote
1
answer
what is authorization in asp.net?
posted
Dec 16, 2014
by
Sathaybama
asp.net
+1
vote
1
answer
What is Ref and Out c# with Example?
posted
Dec 16, 2014
by
Sathaybama
c#
+2
votes
0
answers
Looking for a formal LKSCTP compliance statement?
posted
Dec 15, 2014
by
anonymous
lksctp
sctp
linux
+1
vote
1
answer
What is the difference between X2SETUP and eNB Configuration Update message?
posted
Dec 15, 2014
by
Gnanendra Reddy
x2ap
lte
enodeb
0
votes
1
answer
Describe Oracle database's physical and logical structure In Oracle?
posted
Dec 15, 2014
by
Suchithra
oracle
sql
+1
vote
0
answers
C Program to Solve Tower-of-Hanoi Problem using Recursion
posted
Dec 15, 2014
by
Chirag Gangdev
c
recursion
0
votes
1
answer
What does the parameter p-a represent in PDSCH config ?
posted
Dec 15, 2014
by
anonymous
lte
phy
+2
votes
0
answers
C Program to find GCD of given numbers using recursion?
posted
Dec 15, 2014
by
Chirag Gangdev
c
c programming
+3
votes
1
answer
What are RSA digital signatures?
posted
Dec 15, 2014
by
Vrije Mani Upadhyay
cryptography
network security
+3
votes
1
answer
How large a modulus (key) in should be used in RSA?
posted
Dec 15, 2014
by
Vrije Mani Upadhyay
cryptography
0
votes
1
answer
replace null with 0 for the returned from count(*) function of aggregator in informatica
posted
Dec 15, 2014
by
Sunil
informatica
0
votes
1
answer
Informatica: How to import data from 2 table(parent and child table)?
posted
Dec 15, 2014
by
Sachin
informatica
0
votes
1
answer
Workflow migration: retain persistent values?
posted
Dec 15, 2014
by
Amit Sharma
informatica
+3
votes
1
answer
Why security Mode Complete message is integrity protected but unciphered in RRC ?
posted
Dec 15, 2014
by
Gnanendra Reddy
lte
rrc
enodeb
security
+1
vote
0
answers
How many users PDCCH can be multiplexed for format 1 and format 2 respectively on the same physical resource?
posted
Dec 15, 2014
by
Sridharan P
lte
enodeb
phy
ue
+2
votes
0
answers
How many Maximum bits are there for PUCCH of format 1/1a/1b and 2/2a/2b each and they are spread in how many symbols?
posted
Dec 15, 2014
by
Sridharan P
lte
phy
enodeb
ue
vtp switching
+1
vote
0
answers
How many Symbols are used for PUSCH in a SRS subframe per subcarrier, including multiplexed CQI.
posted
Dec 15, 2014
by
Sridharan P
lte
enodeb
ue
phy
mbms
+1
vote
0
answers
For Turbo coding rate matching, data block is to be spread in how many columns?
posted
Dec 15, 2014
by
Sridharan P
lte
enodeb
phy
ue
+1
vote
1
answer
Is there any difference between regression and confirmation testing ?
posted
Dec 14, 2014
by
Ganesh Kumar
software engineering
+2
votes
1
answer
What is cache-coherency and how does it maintain ?
posted
Dec 14, 2014
by
Neeraj Mishra
operating system
os
+2
votes
0
answers
Does UE read all PO per drx cycle or any one PO in idle mode?
posted
Dec 14, 2014
by
anonymous
lte
ue
enodeb
+3
votes
1
answer
What is a Command Execution Vulnerability?
posted
Dec 13, 2014
by
Vrije Mani Upadhyay
web security
+2
votes
1
answer
What is a Session Fixation Attack?
posted
Dec 13, 2014
by
Vrije Mani Upadhyay
web security
0
votes
1
answer
How can I improve Volte handoffs for Ericsson network?
posted
Dec 13, 2014
by
Mike Chanicka
volte
lte
handover
+1
vote
1
answer
In Oracle, how to enabled triggers performs the following actions?
posted
Dec 12, 2014
by
Kali Mishra
oracle
sql
oracle apps
+1
vote
1
answer
What are constraining triggers in Oracle?
posted
Dec 12, 2014
by
Archana
oracle
sql
+1
vote
1
answer
What are mutating triggers?
posted
Dec 12, 2014
by
Archana
oracle
sql
+1
vote
0
answers
What is spread spectrum frequency hopping and where it is used along with it's advantages ?
posted
Dec 12, 2014
by
Neeraj Mishra
wireless
+2
votes
1
answer
How to Call US ********** numbers +1800 from India?
posted
Dec 12, 2014
by
anonymous
telecom
+3
votes
1
answer
How does bluetooth devices work for data transfer ?
posted
Dec 12, 2014
by
Vikram Singh
bluetooth
+2
votes
1
answer
What is RRC connection EstablishmentCause : emergency, highPriorityAccess, mt-Access, mo-Signalling,mo-Data?
posted
Dec 12, 2014
by
Gnanendra Reddy
lte
rrc
+2
votes
1
answer
What is the use of IBM's Quantify tool and how does it work ?
posted
Dec 12, 2014
by
Ganesh Kumar
tools
+2
votes
1
answer
Layouts and its differentiation in windows phone 8?
posted
Dec 12, 2014
by
Puhal
windows phone 8 app
+3
votes
1
answer
Ubuntu: No space left on device
posted
Dec 11, 2014
by
Gurminder
ubuntu
linux
+2
votes
2
answers
What are the type of extractors in SAP BW Extraction?
posted
Dec 11, 2014
by
anonymous
sap
+1
vote
0
answers
What is the proper format to send the request from Device 1 to Device 2?
posted
Dec 11, 2014
by
anonymous
socket
+2
votes
0
answers
For a buffer of length 6140 from MAC (TTI), what is the number of segments? Why?
posted
Dec 11, 2014
by
Sridharan P
lte
enodeb
ue
phy
Page:
« prev
1
...
158
159
160
161
162
163
164
...
next »
...