This type of access method is generally used by Ethernet to regulate network traffic on a main cable segment.
1 2238What provide communication between the computer and the main LAN cables and are located in the vampire taps attached to the cable.
1 1860A subnet mask is used to mask a portion of the IP address so that TCP/IP can distinguish the __ ID from the __ ID.
1 1984A modem modulates digital signals into analog and __ analog signals back into digital signals.
1 2097Which communication is not synchronized and uses a start and stop bit to separate character strings.
1 1944Your network's id is 128.251.6.0 and subnet mask 255.255.255.0 . What is most likely your router's IP address ?
1 2209You have a Class C network. You have subnetted it into 2 subnets. How many hosts per subnet do you have ?
1 2016Post New Networking Administration Questions
PLEASE SEND FAQ FOR NETWORK ADMINISTRATOR
What is the last major networking problem you troubleshot and solved on your own in the last year?
What are the drawbacks of implementing a ring topology?
Explain the difference between straight-through and crossover cable?
Tell me about your job profile.
Define ipconfig?
Give the importance of the osi physical layer?
Who is network administrator?
What is star topology?
Explain the main purpose of ospf?
Port modes [trunk and access] have any influence on VLAN tagging and un-tagging?
Define peer to peer?
Define dos?
Explain how dynamic host configuration protocol aid in network administration?
Explain netstat?