Computer Science :: Computer Networking
- Which of the following technique is used for encapsulation?
- You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
- With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
- A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
- If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
- Error detection at a data link level is achieved by
- When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
- If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
- Which address is the loopback address?
A.
a technique used in best-effort delivery systems to avoid endlessly looping packets. |
B.
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. |
C.
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size |
D.
All of the above |
E.
None of the above |