Want to see where do you stand among other aspirants in "Computer" category?
Click Here to take quick 10 mins MCQ test to find out.
Got some suggestion about this question or to make this site better? Please leave your comments below.
More Computer Networks Related questions:
The Primary job of the operating system is
A) Â Manage Commands
B) Â Manage Users Â Â Â Â
C) Â Manage Programs
D) Â Manage Resources
Ans:â€“ D ,
Which of the following statement is correct?
Options: Buffering is the process of temporarily storing the data to allow for small variation in device speeds, Buffering is a method to reduce cross-talks, Buffering is a method to reduce the routing overhead, Buffering is storage of data within the transmitting medium until the receiver is ready to receive
You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?
Options: You copied the wrong configuration into RAM., You copied the configuration into flash memory instead., The copy did not override the shutdown command in running-config., The IOS became corrupted after the copy command was initiated.
You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use?
Options: steady-state will be reached faster than if the system is overdamped, the value of the output will exceed the value of the input at times during the transient period, the present overshoot is zero, both a and b
Options: as parallel run involves two different terminals accessing a common database, computers are essential for systems Analysis, Flow of information in an organization is always vertical, alpha testing is the verification process a system goes through for the first time
Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 172.16.30.55 0.0.0.255 172.16.30.55 0.0.0.0 any 172.16.30.55 host 172.16.30.55 0.0.0.0 172.16.30.55 ip any 172.16.30.55