Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 3 4 2 5 3 4 2 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for transferring files from one machine to another? RARP TCP FTP ARP None of these RARP TCP FTP ARP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which network is a cross between circuits switched network and a data-gram network? Virtual-circuit network Virtual-circuit identifier Circuit-switched network None of these Virtual-circuit network Virtual-circuit identifier Circuit-switched network None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network that requires human intervention of route signals is called a None of these ring network bus network T-switched network star network None of these ring network bus network T-switched network star network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In OSI network architecture, the dialogue control and token management are responsibilities of data link layer None of these transport layer network layer session layer data link layer None of these transport layer network layer session layer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main purpose of a data link content monitor? None of these to detect problems in protocols to determine the flow of data to determine the type of transmission used in a data link to determine the type of switching used in a data link. None of these to detect problems in protocols to determine the flow of data to determine the type of transmission used in a data link to determine the type of switching used in a data link. ANSWER DOWNLOAD EXAMIANS APP