Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 3 only 2 only 1, 3 and 4 1 and 2 3 only 2 only 1, 3 and 4 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.136.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.144.0 0.0.7.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.136.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11b standard? 2.4GHz 2.4Gbps 5GHz 5Gbps 2.4GHz 2.4Gbps 5GHz 5Gbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The amount of uncertainty in a system of symbol is called Bandwidth Entropy loss Quantum None of these Bandwidth Entropy loss Quantum None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error-detecting code inserted as a field in a block of data to be transmitted is known as None of these Frame check sequence flow control Error detecting code Checksum None of these Frame check sequence flow control Error detecting code Checksum ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.255 255.255.240.0 255.255.255.0 255.255.248.0 255.255.224.0 255.255.255.255 255.255.240.0 255.255.255.0 255.255.248.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP