Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? None of these IPV5 IPV6 IPV4 None of these IPV5 IPV6 IPV4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking HOSTS file entries are limited to how many characters? Unlimited 8 255 500 None of these Unlimited 8 255 500 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost. P I (K + 1) KIK (1 + F) 1/ (1 - F) None of these K I (K - P) P I (K + 1) KIK (1 + F) 1/ (1 - F) None of these K I (K - P) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class B network, how many hosts are available at each site with a subnet mask of 248? 8,190 4,094 2,046 16,382 1,022 8,190 4,094 2,046 16,382 1,022 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The _____ houses the switches in token ring. MAU NIC None of these nine-pin connector transceiver MAU NIC None of these nine-pin connector transceiver ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The receive equalizer reduces delay distortions using a tapped delay lines None of these difference engine gearshift descrambler tapped delay lines None of these difference engine gearshift descrambler ANSWER DOWNLOAD EXAMIANS APP