Answer Posted / zara
a
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
If i want to crack any serial key using system information then how can i do it? Is it possible?
Enumerate the main responsibilities of data link layer ?
Describe and distinguish between FDMA, TDMA, and CDMA.
What is Mail Gateway
What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. 31. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.
what is buffering and flooding in NIC ?
Explain network equipment used in wired-LANS and explain the function of Hub, Switch, and bridge.
1.Explain the main purpose of IP address? 2.List two purposes for a web browser? 3.Explain an advantage and a disadvantage of multiple search engines? 4.Describe two roles of Internet Services Providers (ISPs)?
If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.
Define CableServe
Discuss the following terms with respect to ATM: VPI, UNI, asynchronous, AAL, Cell, PVC.
Draw the IP datagram header format. “IP datagram has a checksum field still it is called an unreliable protocol”. Justify?
Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.
Subnet the class C network address 198.67.25.0 into eight subnets. Why are the ‘all ones’ and ‘all zeroes’ subnets not used ?
What is MAC address