Find the netid and hostid for the following classful IP addresses? i) 117.34.3.8 ii) 132.57.8.6 iii) 207.3.54.12
2 14159Briefly define and explain the following different types of Pulse Amplitude Modulation (PAM) with some examples. i) 2-PAM ii) 4-PAM iii) 8-PAM iv) 16-PAM v) Quadrature Amplitude Modulation (QAM)
2103What is the theoretical capacity of a channel in each of the following cases? i) Bandwidth: 20KHz SNR(dB) =40 ii) Bandwidth: 200KHz SNR(dB) =06 iii) Bandwidth: 1MHz SNR(dB) =20
5224An ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP wants to distribute these blocks to 2600 customers as follows. a) 200 medium size businesses; each needs 16 addresses b) 400 small businesses; each needs 8 addresses c) 2000 households; each needs 4 addresses Design the subblocks and give the slash notation for each subblock. Find out how many addresses are still available after these allocations.
7645Post New UOG Interview Questions
How action mapping is configured in Struts?
Can we use jquery with node.js?
What is the short cut to open the “Code Snippet Library” in Xcode?
Dear sir-I WANT LAST FIVE YEARS RRB-CHENNAI QUESTION&ANSWER PAPER IN J.ENGG(GRADE:II)-MECHANICAL ENGINEER
What is the use of @bean annotation in spring?
Why are recursive relationships are bad? How do you resolve them?
what are the weakness of symmetric key cryptography and what is the strength of the asymmetric key cryptography?
i need NIC written test paper or give me any idea about written exam.Plz send me at smileever8@gmail.com
Is There Any Possibility For Starting Managed Server During The Absence Of Administrator Server ?
How to setup never expired user password?
How does bloom filter help in searching rows?
What do you mean by separate chaining?
What is the purpose of releasebuilder tool in websphere portal ?
How might you associate Hive to Spark SQL?
How is method overriding different from overloading?