Computer Networking
Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as

Amplitude
Amplitude-shift keying
Amplitude modulation
Aloha
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for encapsulation?

One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
None of these
All of these
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
a technique used in best-effort delivery systems to avoid endlessly looping packets.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The packets switching concept was first proposed

in the early 1960s for military communication systems, mainly to handle speech
in the late 1980s for the Defense Ministry of US.
None of these
All of these
in the late 1950s for Defense Ministry of US

ANSWER DOWNLOAD EXAMIANS APP