Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 2 only 1, 3 and 4 1 and 2 3 only 2 only 1, 3 and 4 1 and 2 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select correct type of line configuration: Dedicated point Single point Multi-point Link Dedicated point Single point Multi-point Link ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system? Safeguard procedure Identification procedure None of these Log-on procedure Security procedure Safeguard procedure Identification procedure None of these Log-on procedure Security procedure ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Eight stations are competing for the use of the shared channel using the modified Adaptive free walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? 10 slots 5 slots 1 slots None of these 14 slots 10 slots 5 slots 1 slots None of these 14 slots ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does the command o/r 0x2142 provide? It is used to view the lost password. It is used to restart the router. It is used to enter ROM Monitor mode. It is used to bypass the configuration in NVRAM. It is used to view the lost password. It is used to restart the router. It is used to enter ROM Monitor mode. It is used to bypass the configuration in NVRAM. ANSWER DOWNLOAD EXAMIANS APP