35301. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
35302. HOSTS file entries are limited to how many characters?
35303. Demodulation is the process of
35304. In a transformer delivering a variable load,zero voltage regulation can occur at:
35305. You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
35306. Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
35307. Modulation is the process of
35308. Devices interconnected by the LAN should include
35309. What are the data transmission channels available for carrying data from one location to another?
35310. On a class B network, how many hosts are available at each site with a subnet mask of 248?
35311. Which of the following technique is used for encapsulation?
35312. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
35313. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
35314. A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
35315. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
35316. Error detection at a data link level is achieved by
35317. When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
35318. Which network topology is considered passive?
35319. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
35320. Which address is the loopback address?
35321. Error rate is
35322. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
35323. Modem is used in data transmission. When was it invented and in which country?
35324. Which of the following technique is used for Time-To-Line (TTL)?
35325. Communication network is
35326. Which of the following is an advantage to using fiber optics data transmission?
35327. In an alternating voltage supply of constant voltage feeding a Transformer,the presence of higher order harmonics can cause significant changes in:
35328. Bandlimited signal is
35329. Computers in a LAN can be interconnected by radio and infrared technologies.
35330. You have a network ID of 18.104.22.168 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
35331. How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
35332. Which of the following is the address of the router?
35333. Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
35334. A devices that links two homogeneous packet-broadcast local networks, is
35335. Identify the odd term amongst the following group:
35336. Which of the following divides the high speed signal into frequency bands?
35337. What is the first octet range for a class C IP address?
35338. Which utility is useful for finding the local host name?
35339. Which of the following conditions is used to transmit two packets over a medium at the same time?
35340. The Maximum percentage efficiency of a 1 KVA transformer with iron losses equal to 125W at upload is:
35341. Distributed Queue Dual Bus is a standard for
35342. A teleprocessing system may consist of
35343. If the ASCII character G is sent and the character D is received, what type of error is this?
35344. Which layer of OSI determines the interface of the system with the user?
35345. The transfer of data from a CPU to peripheral devices of a computer is achieved through
35346. What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
35347. Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
35348. Which among the following logic families are fastest in operation?
35349. Which of the following characteristic(s) is/are suited to the PSS applications?
35350. Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?