The _______ domains define registered hosts according to their general behavior.
A. generic
B. country
C. inverse
D. none of the above

1 Answer

Answer :

A. generic

Related questions

Description : f four hosts on anetworkbelong tothesame group, a totalof _______ sent inresponse to a general query message. A) one membership report is B) two membership reports are C) three membership reports are D) noneof the above

Last Answer : two membership reports are

Description : A one-to-many communication between one sourceand a specific group of hosts is classifiedas a _______ communication. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : multicast

Description : Market demand for generic domains of cctld extensions in future?

Last Answer : You will probably lose money. And as a web-developer I hate people that do what you want to do and would never give you a dime.

Description : Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply. A. A switch remembers which devices are connected on each interface, while a hub does not. B. A hub is a ... versions of switches. a. A,B b. A,B,C c. A,B,C,D d. A,C,D

Last Answer : b. A,B,C

Description : A _______is an ARP thatacts on behalf of a set of hosts. A) ARP B) RARP C) proxy ARP D) noneof the above

Last Answer : proxy ARP

Description : A one-to-all communication between one source and all hosts on a network is classified as a_______ communication. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : broadcast

Description : With anIP address set starting with 150, you currently havesix offices that you are treating as subnets. Plans are in place toopen 10 more officesbefore the end of theyear. What subnet mask should you useto ... maximize thenumberof hosts available at eachsite? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 248

Description : You are working with a network thathas the network ID 192.168.10.0. What subnet should you use that supportsup to 25 hosts and a maximum number of subnets? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252

Last Answer : 255.255.255.224

Description : HOSTS file entries are limited to how many characters? A. 8 B. 255 C. 500 D. Unlimited E. None of the above

Last Answer : 255

Description : With anIP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 252

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above

Last Answer : a. i only

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : If a Company require 60 hosts then What is the best possible subnet mask? a. 255.255.255.0 b. 255.255.255.192 c. 255.255.225.224 d. 225.225.255.240

Last Answer : b. 255.255.255.192

Description : A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet? a. 14 b. 30 c. 62 d. 126

Last Answer : c. 62

Description : The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet? a. 62 subnets and 262142 hosts. b. 64 subnets and 262142 hosts. c. 62 subnets and 1022 hosts. d. 64 subnets and 1024 hosts

Last Answer : c. 62 subnets and 1022 hosts.

Description : The ………………………. protocol was originally developed as a mechanism to enable diskless hosts to be remotely booted over a network as workstations. A. RARP B. ARP C. DHCP D. BOOTP

Last Answer : D. BOOTP

Description : DHCP stands for……………………………….. A. Dynamic Host Control Protocol B. Diskless Hosts Control protocol C. Diskless Hosts Configuration protocol D. Dynamic Host configuration Protocol

Last Answer : D. Dynamic Host configuration Protocol

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : ……………………………. extends …………………………. to provide the full set of configuration parameters defined in the Requirements for Internet Hosts RFC. A. DHCP, BOOTP B. BOOTP, DHCP C. RARP, BOOTP D. DHCP, RARP

Last Answer : A. DHCP, BOOTP

Description : ………………...is a minimal protocol that allows isolated hosts to link via TCP/IP over the telephone network and ………………..uses a proposed international standard for transmitting HDLC over asynchronous lines. A. LCP, PPP B. PPP, LCP C. SLIP, PPP D. PPP, SLIP

Last Answer : C. SLIP, PPP

Description : Infrastructure software are covered under ? Generic Products Customised Products Generic and Customised Products None of the above

Last Answer : Generic Products

Description : Frequency and period are ______. A) inverse ofeach other B) proportional to each other C) the same D) none of the above

Last Answer : inverse ofeach othe

Description : In a/an ………… of DNS resolver, the queried name server can return the best answer it currently has back to the DNS resolver. a. Recursive queries b. Iterative queries c. Reverse queries d. Inverse queries

Last Answer : b. Iterative queries

Description : _______ was first used to catalog organisms into one of three domains. a. Photosynthesis b. Ribosomal RNA genes c. Nuclear DNA genes d. Mitochondrial DNA genes

Last Answer : b. Ribosomal RNA genes

Description : According to widely accepted fluid mosaic model cell membranes are semi-fluid, where lipids and integral proteins can diffuse randomly. In recent years, this model has been modified in several ... domains of the membrane. (d) Many proteins remain completely embedded within the lipid bilayer.

Last Answer : (b) Proteins can also undergo flip-flop movements in the lipid bilayer.

Description : The use of spooler programs and/or “. Hardware allows personal computer operators to do the processing work at the same time a printing operation is in progress a. Registered mails b. Memory c. CPU d. Buffer

Last Answer : Buffer

Description : Define what is Generic?

Last Answer : 1. Generic help us to create flexible strong type collection. 2. Generic basically separate the logic from the datatype in order to maintain better reusability, better maintainability, etc.

Description : Define generic brand?

Last Answer : Ans: No-name' or non-decrepit brand that is not advertised, and is sold at a price substantially lower than the comparable branded products

Description : Define the term of Inverse of a relation. -Maths 9th

Last Answer : For any binary relation R, a second relation can be constructed by merely interchanging first and second components in every ordered pair. The relation thus obtained is called the inverse of the first one and designated as R-1. Thus, R-1 = {(y, x ... {(1, 2), (2, 3), (3, 4), (5, 4)}. So (R-1)-1 = R.

Description : Define following parameter of rectifier: (i) Ripple factor (ii) Efficiency (iii) Peak Inverse Voltage (iv) Transformer utilization factor

Last Answer : (i) Ripple Factor - Ripple factor (γ) may be defined as the ratio of the root mean square (rms) value of the ripple voltage to the absolute value of the DC component of the ... the same rectifier. Effective VA Rating of transformer is the average of primary and secondary VA rating of transformer.

Description : SMERA has been registered under _______ A. Securities and Exchange Board of India Act, 1992 B. Reserve Bank of India Act, 1934 C. Banking Regulation Act, 1949 D. Securities and Exchange Board of India (Credit Rating Agencies) Regulations, 1999 E. None of these

Last Answer : D. Securities and Exchange Board of India (Credit Rating Agencies) Regulations, 1999 Explanation: SMERA has been registered under Securities and Exchange Board of India (Credit Rating Agencies) Regulations, 1999.

Description : Which country hosts Commonwealth Games 2018? (a) Australia (b) England (c) Scotland (d) None of These

Last Answer : (a) Australia

Description : Which country will hosts Commonwealth Games 2022? (a) Australia (b) England (c) Scotland (d) None of These

Last Answer : (b) England

Description : Which Country hosts first ever meeting of women foreign ministers? (a) Canada (b) USA (c) UK (d) None of These

Last Answer : (a) Canada

Description : The _______ is used by a router in response to a received leave report. A) general query message B) special query message C) membershipreport D) noneof the above

Last Answer : special query message

Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above

Last Answer : wirelessLAN

Description : In IEEE 802.11, when a frame is coming from an AP and going to astation, the address flag is _______. A) 00 B) 01 C) 10 D) 11

Last Answer : 01

Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PCF

Description : IEEE hasdefined the specifications fora wireless LAN, called _______, whichcovers the physical and data link layers. A) IEEE 802.3 B) IEEE 802.5 C) IEEE 802.11 D) IEEE 802.2

Last Answer : IEEE 802.11

Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five

Last Answer : three

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above

Last Answer : 48-b

Description : The _______ layer of Ethernet consistsof the LLC sublayer and the MAC sublayer. A) data link B) physical C) network D) none of the above

Last Answer : data link

Description : A _______ can check the MAC addresses contained inthe frame. A) passive hub B) repeater C) bridge D) route

Last Answer : bridge