A high speed communication equipment typically would not be needed for
You need to determine whether the configuration is initialized or if a duplicate IP address is configured on your NT workstation. Which utility should you use?
1 Crore+ students have signed up on EduRev. Have you? Download the App |
Which of the following protocols is used to monitor network devices such as hubs, switches, and routes?
Which protocol is used to convert IP addresses to MAC address?
Which of the following layer oversees both error control and flow control at the source to destination level?
Which layer deals with
(i) File system transfer
(ii) Virtual terminals implementation
(iii) Inter process communication
Which of the following error detection method consists of just one redundant bit per data unit?
Which of the following is NOT true with respect to a transparent bridge and a router?
Which of the following is incorrect statement?
Which one of the following uses UDP as the transport protocol?
Consider the following clauses:
(i) Not inherently suitable for client authentication.
(ii) Not a state sensitive protocol.
(iii) Must be operated with more than one server.
(iv) Suitable for structured message organization.
(v) May need two ports on the serve side for proper operation.
The option that has the maximum number of correct matches is
63 videos|7 docs|165 tests
|
63 videos|7 docs|165 tests
|