State the following statement is true or
false.
I. In class B addresses a total of
more than 1 billion addresses
can be formed.
II. Class E addresses are reserved
for future or experimental use.
a. True, False
b. True, True
c. False, True
d. False, False

1 Answer

Answer :

b. True, True

Related questions

Description : State the following statement is true or false. i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : State the following statement is true or false. i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : addresses are reserved for multicasting. a. Class B b. Class C c. Class D d. Class E

Last Answer : c. Class D

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : .......... addresses are reserved for multicasting. A) Class B B) Class C C) Class D D) Class E

Last Answer : C) Class D

Description : addresses are reserved for multicasting. A) Class B B) Class C C) Class D D) Class E

Last Answer : D) Class E

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : The number of addresses in a class A block is _______. A) 65,534 B) 16,777,216 C) 256 D) none of the above

Last Answer : 16,777,216

Description : The number of addresses in a class B block is _______. A) 65,536 B) 16,777,216 C) 256 D) none of the above

Last Answer : 65,536

Description : The number of addresses in a class C block is _______. A) 65,534 B) 16,777,216 C) 256 D) none of the above

Last Answer : 256

Description : In IPv4, class _______ has the greatestnumber of addresses in eachblock. A) A B) B C) C D) D

Last Answer : A

Description : Which form of byte assigning strategy is adopted in class B type of network corresponding to IP addresses? a. Network.Node.Node.Node b. Network.Network.Node.Node c. Network.Network.Network.Node d. Network.Node.Node.Node

Last Answer : b. Network.Network.Node.Node

Description : . In addresses for _______ networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host. A. class A B. class C C. class B D. class D

Last Answer : C. class B

Description : “““.are words that aprogramming language has set asidefor its own use. (A) Control words (B) Control structures (C) Reserved words (D) Reserved keys (E) None of these

Last Answer : Reserved words

Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The anycast service is included in IPV6. A) True, True B) True, False

Last Answer : i) A connection oriented protocol can only use unicast addresses.

Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The any cast service is included in IPV6. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above

Last Answer : a. i only

Description : As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved. a) authentication b) guaranteed constant rate c) reliability d) store and forward

Last Answer : b) guaranteed constant rate

Description : The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method. a) Packet switching b) Circuit switching c) Line switching d) Frequency switching

Last Answer : b) Circuit switching

Description : The required resources for communication between end systems are reserved for theduration of the session between end systems in method. a. Packet switched b. Bit switched c. Line switched d. Circuit switched

Last Answer : d. Circuit switched

Description : What happens to ip addresses if there are over 4,23 billion internet users.

Last Answer : answer:IPv6 This is planned for. I wouldn’t worry about it.

Description : Which intermediaries are more likely to get involved during the transfer function of an e-mail system? a. Storage and forwarding of e-mail for certain addresses b. Act as gateways to other e-mail or messaging systems c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Not all reserved words are written in lowercase. TRUE or FALSE?

Last Answer : FALSE. All reserved words must be written in lowercase; otherwise, the C compiler would interpret this as unidentified and invalid.

Description : State weather the following statement is true or false for Point-to-Point Protocol 1). It is still in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of asynchronous lines have long been ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : State weather the following statement is true or false for Hierarchical Routing 1). In hierarchical routing, the routers are divided into regions. 2) Each router is having the idea about internal structure of other regions 3). ... C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : B. 1. true, 2. false, 3.true

Description : You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and192.168.7.0. What subnet mask can you use to combine these addresses intoone? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252

Last Answer : 255.255.252.0

Description : Which of the following is/are true? A. Because of its thickness, the tensile strength of a healing wound on the eyelid is much less than one on the thick skin of the back. B. By 2 days, ... strength reaches a plateau by 3 weeks. D. Wounds rarely, if ever, regain the strength of intact tissues.

Last Answer : Answer: BD DISCUSSION: Tensile strength measures load per cross-section area at rupture, whereas burst strength measures load required to break a wound, regardless of dimension. Therefore, skin wounds have ... a slower rate for more than a year. Wounds do not regain the strength of normal tissue

Description : State true of false. i) Public can only be assigned to class ii) Protected protects a statement iii) Protected method is never accessible outside the package iv) Friendly variable may be accessible outside class A) i- ... -false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : C) i-false, ii-true, iii-false, iv-false

Description : If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be a. 216 b. 65,536 c. 64K d. Any of the above

Last Answer : 65,536

Description : A _______ can check the MAC addresses contained inthe frame. A) passive hub B) repeater C) bridge D) route

Last Answer : bridge

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : In IPv6,____ address defines a groupof computers with addresses that have thesame prefix. A) aunicast B) a multicast C) an anycast D) none of the above

Last Answer : an anycast

Description : An organization isgranteda block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted? A) 8 B) 16 C) 32 D) none of the above

Last Answer : 16

Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.128/29. How manyaddressesare granted? A) 8 B) 16 C) 32 D) none of the above

Last Answer : 8

Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.64/28. How manyaddresses are granted? A) 8 B) 16 C) 32 D) none of the above

Last Answer : 16

Description : What is the lastaddress of a blockof classless addresses ifone of the addresses is 12.2.2.6/30? A) 12.2.2.2 B) 12.2.2.6 C) 12.2.2.7 D) none of the above

Last Answer : 12.2.2.7

Description : What is the lastaddress of a blockof classless addresses ifone of the addresses is 12.2.2.127/28? A) 12.2.2.16 B) 12.2.2.112 C) 12.2.2.127 D) none of the above

Last Answer : 12.2.2.127

Description : Find thenumber of addresses in ablock of classless addresses if one of theaddresses is 12.2.2.7/30. A) 2 B) 4 C) 8 D) none of the above

Last Answer : 4

Description : Find thenumber of addresses in ablock of classless addresses if one of theaddresses is 12.2.2.7/24. A) 32 B) 64 C) 256 D) none of the above

Last Answer : 256

Description : What is the firstaddressof a block of classless addresses ifone of the addresses is 12.2.2.127/28? A) 12.2.2.0 B) 12.2.2.96 C) 12.2.2.112 D) none of the above

Last Answer : 12.2.2.112