Computer Networking Which of the following medium access control technique is used for bus/tree? MAC None of these token ring CSMA token bus MAC None of these token ring CSMA token bus ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)? first four first seven first five None of these first three first four first seven first five None of these first three ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following access lists will allow only HTTP traffic into network 196.15.7.0? access-list 110 permit ip any 196.15.7.0 0.0.0.255 access-list 10 deny tcp any 196.15.7.0 eq www access-list 100 permit 196.15.7.0 0.0.0.255 eq www access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www access-list 110 permit ip any 196.15.7.0 0.0.0.255 access-list 10 deny tcp any 196.15.7.0 eq www access-list 100 permit 196.15.7.0 0.0.0.255 eq www access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The amount of uncertainty in a system of symbol is called Entropy Bandwidth loss None of these Quantum Entropy Bandwidth loss None of these Quantum ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Eight stations are competing for the use of the shared channel using the modified Adaptive free walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? 14 slots 1 slots 5 slots 10 slots None of these 14 slots 1 slots 5 slots 10 slots None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class B network, how many hosts are available at each site with a subnet mask of 248? 2,046 8,190 16,382 1,022 4,094 2,046 8,190 16,382 1,022 4,094 ANSWER DOWNLOAD EXAMIANS APP