Computer Networking What protocol is used between E-Mail servers? None of these FTP SMTP SNMP POP3 None of these FTP SMTP SNMP POP3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The coming together of three technologies i.e. microelectronics, computing and communications has ushered in information technology educational upgradation information explosion business revolution None of these information technology educational upgradation information explosion business revolution None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Start and stop bits are used in serial communication for Synchronization Error detection Slowing down the communication Error correction Synchronization Error detection Slowing down the communication Error correction ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character G is sent and the character D is received, what type of error is this? recoverable multiple-bit None of these burst single-bit recoverable multiple-bit None of these burst single-bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.255 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign? 255.255.248.0 255.255.255.0 255.255.240.0 255.255.255.255 255.255.224.0 255.255.248.0 255.255.255.0 255.255.240.0 255.255.255.255 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP