logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • Which of the following technique is used for fragment?


  • Options
  • A. a technique used in best-effort delivery systems to avoid endlessly looping packets
  • B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
  • C. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
  • D. All of the above
  • E. None of the above

  • Correct Answer
  • one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size 


  • Networking problems


    Search Results


    • 1. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?

    • Options
    • A. 192
    • B. 192.168.10
    • C. 0.0.0.5
    • D. 51
    • E. None of the above
    • Discuss
    • 2. Contention is

    • Options
    • A. One or more conductors that serve as a common connection for a related group of devices
    • B. a continuous frequency capable of being modulated or impressed with a second signal
    • C. the condition when two or more stations attempt to use the same channel at the same time
    • D. a collection of interconnected functional units that provides a data communications service among stations attached to the network
    • E. None of the above
    • Discuss
    • 3. A remote batch-processing operation in which data is solely input to a central computer would require a:

    • Options
    • A. telegraph line
    • B. simplex lines
    • C. mixedband channel
    • D. All the above
    • E. None of the above
    • Discuss
    • 4. Frames from one LAN can be transmitted to another LAN via the device

    • Options
    • A. Router
    • B. Bridge
    • C. Repeater
    • D. Modem
    • Discuss
    • 5. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

    • Options
    • A. FTP
    • B. SNMP
    • C. SMTP
    • D. RPC
    • E. None of the above
    • Discuss
    • 6. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.

    • Options
    • A. Modem
    • B. Cable
    • C. Hub
    • D. Router
    • Discuss
    • 7. Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer:

    • Options
    • A. Bandwidth alternatives
    • B. Switching alternating
    • C. Inter organizational networks
    • D. Extranets
    • Discuss
    • 8. In CRC there is no error if the remainder at the receiver is _____.

    • Options
    • A. equal to the remainder at the sender
    • B. zero
    • C. nonzero
    • D. the quotient at the sender
    • Discuss
    • 9. How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host?

    • Options
    • A. 16 - bits
    • B. 32 - bits
    • C. 48 - bits
    • D. 64 - bits
    • E. None of the above
    • Discuss
    • 10. Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine?

    • Options
    • A. UDP
    • B. VMTP
    • C. X.25
    • D. SMTP
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment