Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 1, 3 and 4 3 only 2 only 1 and 2 1, 3 and 4 3 only 2 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following connectivity devices is used to extend a network on a purely mechanical basis? Router Active hub Gateway 802.6 Switch Router Active hub Gateway 802.6 Switch ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts? 255.255.255.240 255.255.255.248 255.255.255.252 255.255.255.224 255.255.255.192 255.255.255.240 255.255.255.248 255.255.255.252 255.255.255.224 255.255.255.192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocol is connection-oriented? IPX NetBEUI TCP UDP IPX NetBEUI TCP UDP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Frames from one LAN can be transmitted to another LAN via the device Modem None of these Repeater Router Bridge Modem None of these Repeater Router Bridge ANSWER DOWNLOAD EXAMIANS APP
Computer Networking ICMP (Internet Control Message Protocol) is a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a protocol used to monitor computers None of these a TCP/IP high level protocol for transferring files from one machine to another a protocol that handles error and control messages a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a protocol used to monitor computers None of these a TCP/IP high level protocol for transferring files from one machine to another a protocol that handles error and control messages ANSWER DOWNLOAD EXAMIANS APP