Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 3 only 1, 3 and 4 2 only 1 and 2 3 only 1, 3 and 4 2 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following medium access control technique is used for bus/tree? token bus None of these CSMA MAC token ring token bus None of these CSMA MAC token ring ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol None of these Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol None of these Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is Unicode? Only few languages are supported Represents symbol or characters used in any langua Supports only few characters Characters from A to Z Only few languages are supported Represents symbol or characters used in any langua Supports only few characters Characters from A to Z ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use? access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of a client-server model? DNS None of these All of these TELNET FTP DNS None of these All of these TELNET FTP ANSWER DOWNLOAD EXAMIANS APP