Computer Networking
Which of the following technique is used for Time-To-Line (TTL)?

One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
a technique used in best-effort delivery system to avoid endlessly looping packets.
None of these
All of these
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
MAC is

None of these
a method of determining which device has access to the transmission medium at any time
network access standard for connecting stations to a circuit-switched network
a method access control technique or multiple-access transmission media
a very common bit-oriented data link protocol issued to ISO.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Network 206.143.5.0 was assigned to the Acme Company to connect to its ISP. The administrator of Acme would like to configure one router with the commands to access the Internet. Which commands could be configured on the Gateway router to allow Internet access to the entire network?1. Gateway (config) # ip route 0.0.0.0 0.0.0.0 206.143.5.22. Gateway (config) # router rip3. Gateway (config-router) # network 206.143.5.04. Gateway (config-router) # network 206.143.5.0 default

1, 2 and 4
1 and 4
1 only
3 only

ANSWER DOWNLOAD EXAMIANS APP