Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? IPV4 None of these IPV5 IPV6 IPV4 None of these IPV5 IPV6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are layers in the TCP/IP model?1. Application2. Session3. Transport4. Internet5. Data Link6. Physical 1, 3 and 4 3, 4 and 5 1 and 2 2, 3 and 5 1, 3 and 4 3, 4 and 5 1 and 2 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following specifies the network address and host address of the computer? The IP address The TCP address The default gateway None of these The subnet mask The IP address The TCP address The default gateway None of these The subnet mask ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? A physical address that is randomly assigned each time the computer is started A physical address that is assigned by the manufacturer An alias for the computer name A logical address that identifies the workstation The logical domain address for the workstation A physical address that is randomly assigned each time the computer is started A physical address that is assigned by the manufacturer An alias for the computer name A logical address that identifies the workstation The logical domain address for the workstation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The core diameter of a single-mode fibers is about 10 times the fiber radius 7 times the light carried in the fiber 10 times the wavelength of the light carried in the fiber 3 times the wavelength of the light carried in the fiber None of these 10 times the fiber radius 7 times the light carried in the fiber 10 times the wavelength of the light carried in the fiber 3 times the wavelength of the light carried in the fiber None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 4 protocols Layer 5 protocols Layer 6 protocols Layer 7 protocols None of these Layer 4 protocols Layer 5 protocols Layer 6 protocols Layer 7 protocols None of these ANSWER DOWNLOAD EXAMIANS APP