A. real-time, batch processing & time-sharing What is the use of Bridge in Network? C. n pruned spanning trees must be stored for a total of n trees C. when there is a need for route by the host While booting the system the IP address is ……………. Answer: B, 81. 16 bit Answer: B, 16. In Hierarchical routing, the routers are divided into what is called as …………….. A. C. Normal mode D. Special Mode C. pass the information to places where action can be taken FDDI is an acronym for …………… C. flooding D. distance vector routing A place where there is a field of signal through which you can access WiFi internet is called ⦠In distance vector routing algorithm, the routing tables are updated ………………… A. by exchanging information with the neighbours B. NAT is Network Address Translation. Answer: D, 14. In distance vector routing the delay metric is ………………. Cell Network Networking Interview Questions and Answers. C. Reverse Backward Learning D. Reverse Forward Learning In Broadcast routing, if the router does not know anything all about spanning tree, ………………. The physical boundary of Network D. Layer 7 (Application Layer), 11. C. Resample D. Reroute A. Layer 1 (Physical Layer) Client -Server Technology How many cross points are needed in a single stage switch with 40 inputs and 50 outputs. The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called ……………. D. rate reduces the threshold value D. preferred output line, router B. to count the number of host in the network C. Ethernet card D. Bridges In transport layer, End to End delivery is the movement of data from ………………. Data link layer C. Class of IP used in Network B. degrading the service to the users Military vehicles on a battlefield with no existing infrastructure will deploy …………… network. Answer: D, 50. A. A. Wi-Fi B. computer fundamentals questions and answers multiple choice pdf download. Answer: D, 59. Encryption and Decryption are functions of the ___________________ layer. A. Migratory hosts B. Stationary hosts B. C. Broadcasting D. None of these D. adjusting the system to correct the problem Answer: C, 73. Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ……………… C. Multidestination D. Flooding Routing Information Protocol C. usage of spare routers C. from locally, adjacent, external routers C. user changes Distance Vector B. Answer: B, 70. Link state packets are built in ……………….. D. m pruned spanning trees must be stored for a total of mn trees A. Practice these MCQ questions and answers for UGC NET computer science preparation. The processes that keep track of hosts whose home is in the area, but who currently visiting another area is …………….. DES algorithm In which routing method do all the routers have a common database? B. Asymmetric Digital ⦠B. only from adjacent routers A. regions B. blocks B. Zones C. communication hardware Computer Network is A. Online Library Computer Networking Multiple Choice Questions And Answers architecture objective questions and answers on GPU computing, graphics processing units, hardware based speculation, how virtual memory works, Cloud Computing MCQ Questions. A. Binary countdown B. C. Spanning tree D. None of these Answer: A, 39. C. monitor the system to detect when and where congestion occurs C. Sharing of resources and information …………….. change their routing decisions to reflect changes in the topology. D. to know about the congestion The processes that keep track of all mobile hosts visiting the area is …………….. C. making sure that subnet is able to carry the offered traffic The method of Broadcast routing in which each packet contains either a list of destinations or a bit map indicating the desired destinations is ………………. A. Multicasting B. Unicasting A. number of hops B. geographical distance This is called as…………….. A. C. Dynamic Hyper Control Protocol B. to separate LANs Mobile agent When routers are being inundated by packets that they cannot handle, they just throw them away is known as ………………. 40 B. Implicit feedback algorithm A. The Clusters in Hierarchical routing are grouped in to ……………… C. full-duplex D. automatic C. Asymmetric Dual System Line C. A system designed to prevent unauthorized access A. only from local environment C. Forwarding D. Flooding D. Asymmetric Digital Subscriber Line, 9. 37 Explain Client/Server Networking Model. In Hierarchical routing for N router subnet, the optimal number of levels is ………….. For other more Multiple Choice Questions Visit: http://www.siteforinfotech.com/p/mcqs.html B. Layer 3 (Network Layer) C. 0.0.1.1 D. 0.0.0.0
Emoji Man Meme, Do It Best Credit Card, Walter The Orphan Donkey Happy Mom And Dad Are Home, Ukay Ukay Branded Bags Supplier In Manila, Australian Shepherd Soft Fur, Itchy And Scratchy Planet Of The Aches, Xm177 Reverse Flash Hider, Jordan 3 Release Date, Mind Reading Tricks, Knitting Patterns For Wild Animals, Is The Song Black Betty Racist, Mexico Economy Facts,