Computer Networking When creating a pool of global addresses, which of the following can be used instead of the netmask command? prefix-length / (slash notation) block-size no mask prefix-length / (slash notation) block-size no mask ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The coming together of three technologies i.e. microelectronics, computing and communications has ushered in information technology educational upgradation information explosion None of these business revolution information technology educational upgradation information explosion None of these business revolution ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM? Frequency-division multiple access Frequency modulation Frequency-shift keying Amplitude modulation None of these Frequency-division multiple access Frequency modulation Frequency-shift keying Amplitude modulation None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router?1. 172.16.1.1002. 172.16.1.1983. 172.16.2.2554. 172.16.3.0 3 and 4 only 1 only None of these 2 and 5 only 2 and 3 only 3 and 4 only 1 only None of these 2 and 5 only 2 and 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer: Switching alternating None of these Extranets Bandwidth alternatives Inter organizational networks Switching alternating None of these Extranets Bandwidth alternatives Inter organizational networks ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at the data link level is achieved by Hamming Code Cyclic Redundancy Code Bit Stuffing Equalization Hamming Code Cyclic Redundancy Code Bit Stuffing Equalization ANSWER DOWNLOAD EXAMIANS APP