Answer Posted / zara
a
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Write two ways in which computer applications differ from network applications ?
Explain CSMA/CD
What are the basic functions of the data link layer?
what happens when two consigitive ports of switch are connacted using one cross cabel with each other?(how the whole network gets down)
Explain network topologies ?
how to take backup of BIOS ?
Subnet the class C network address 198.67.25.0 into eight subnets. Why are the ‘all ones’ and ‘all zeroes’ subnets not used ?
Explain The ATM reference model
What Goals do you have in this career?
Why transport layer protocols like TCP and UDP are called end-to-end protocols. What is the difference between them?
Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.
what are the major componets of client server application?
1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?
What is a minimum data size of an Ethernet frame ?
When you look at a Cisco switch like Cisco 2950, why are the ports labeled with an 'X' behind the number? Like 1x, 2x.....23x, 24x, and what does it mean when there is no 'X'?