We candivide today's networks into ____ broad categories.
A)
four
B)
three
C)
five
D)
two

1 Answer

Answer :

three

Related questions

Description : We candivide ____ into two different schemes: synchronousor statistical. A) FDM B) TDM C) WDM D) none of the above

Last Answer : TDM

Description : According to accepting public deposits, NBFCs can be classified into ____ broad categories. A. Two B. Three C. Four D. All of the Above E. None of the Above

Last Answer : A. Two Explanation: According to accepting public deposits, NBFCs can be classified into two broad categories, viz., (i) NBFCs accepting public deposit (NBFCs-D) (ii) NBFCs not accepting/holding public deposit (NBFCs-ND).

Description : ICMP messagesare divided into two broad categories: _____________. A) query and error reporting messages B) request and response messages C) request and reply messages D) noneof the above

Last Answer : query and error reporting messages

Description : Coding schemes can be divided into two broad categories…………, …… A. character coding, integer coding B. hamming coding and block coding C. Hamming coding and convolution coding D. Block Coding and Convolution Coding.

Last Answer : D. Block Coding and Convolution Coding.

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : Social research can be divided into- (i) Two categories (ii) Three categories (iii) Four categories (iv) Five categories

Last Answer : (iii) Four categories

Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five

Last Answer : three

Description : Fiber splicing is divided into two broad categories that describe the techniques used for fiber splicing. What are they?

Last Answer : Mechanical and fusion splicing.

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems

Last Answer : D. Open computer systems, communication systems, and embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : Briefly explain the two broad categories of a newspaper format giving suitable examples. -Technology

Last Answer : The analysis of newspaper content suggests two broad categories of newspaper formatBroadsheet Press (quality or serious press)…. Explanation with examplesTabloid Press (Popular or sensational press)… Explanation with examples

Description : Broad Categories of Software are: a) System Software b) Application Software c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : We can divide coding schemes intotwobroad categories: ________ and______coding. A) block; linear B) linear; nonlinear C) block; convolution D) none of the above

Last Answer : block; convolution

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and192.168.7.0. What subnet mask can you use to combine these addresses intoone? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252

Last Answer : 255.255.252.0

Description : The ATM standard defines______ layers. A) two B) three C) four D) five

Last Answer : three

Description : Traditionally, _____ methods of switching have been important. A) four B) three C) five D) six

Last Answer : three

Description : Today’s computer giant IBM was earlier known by different name which was changes in 1924. What was that name? a. Tabulator Machine Co. b. Computer Tabulating Recording Co. c. The Tabulator Ltd. d. International Computer Ltd.

Last Answer : Tabulator Machine Co.

Description : What is meant by quality of service? What are the two categories of it?

Last Answer : The quality of service defines a set of attributes related to the performance of the connection. For each connection, the user can request a particular attribute each service class is associated with a set of attributes. The two main categories are, ∙ User Oriented ∙ Network Oriented

Description : Which of hte following is considered a broad band communication channel? a. coaxial cable b. fiber optics cable c. microwave circuits d. all of above

Last Answer : all of above

Description : A _____ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks. A. firewall B. ESP C. SSL D. both a and b

Last Answer : A. firewall

Description : Define flowcontrol. Mention the categories of it.

Last Answer : Flowcontrol refers to a set of procedures usedtorestrict the amount ofdata.Thesender cansenddata before waiting for acknowledgment.

Description : For purposes of routing, the Internet isdivided into ___________. A) wide area networks B) autonomous networks C) autonomous systems D) none of the above

Last Answer : autonomous systems

Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer

Last Answer : A. an application level , an IP level

Description : In most Wide Area Networks, the subnet consists of two distinct components: which are they? A. Transmission Lines and Switching Elements. B. host and subnet C. Transmission Lines and host D. subnet and Switching Elements.

Last Answer : A. Transmission Lines and Switching Elements.

Description : A network router joins two _________ together? A. Computers B. Switches C. Networks D. Gateway

Last Answer : C. Networks

Description : Toavoid collisions on wireless networks, ________was invented. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CA

Description : The secondgeneration of cable networks is called a(n) _________ network. A) HFC B) HCF C) CFH D) none of the above

Last Answer : HFC

Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : VOFR

Description : In IPv6,a ______address is used ifa site with several networks uses the Internetprotocols but is not connectedto the Internet for security reasons. A) link local B) site local C) mapped D) none of the abov

Last Answer : site local

Description : In networks thatdo not support physical multicastaddressing, multicastingcan be accomplished through _______. A) mapping B) queries C) tunneling D) noneof the above

Last Answer : tunneling

Description : In ________, the multicastpacket must reach only those networks that haveactive members for thatparticular group. A) RPF B) RPB C) RPM D) none of the above

Last Answer : RPM

Description : In _______delivery, the deliverer of theIP packet and the destination are on different networks. A) aconnection-oriented B) a direct C) an indirect D) none of the above

Last Answer : an indirect

Description : ________ is a collection of many separate networks. A) A WAN B) An internet C) a LAN D) None of the above

Last Answer : An internet

Description : In the original ARPANET,_______ were directly connected together. A) IMPs B) host computers C) networks D) routers

Last Answer : IMPs

Description : MCI and AT&T are examples of whichof the following? A) Social networks B) Communications systems C) Internet service providers D) Mobisodes

Last Answer : Internet service providers

Description : Internet-like networks between a company and its businesspartners. Select the best fit for answer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Extranets

Description : Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit foranswer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Inter organizational networks

Description : Internet-like networks within an enterprise. A. Intranets B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Intranets

Description : How many hostsare attached to eachof the local area networks at your site? A. 128 B. 254 C. 256 D. 64 E. None of the above

Last Answer : 254

Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above

Last Answer : a. i only

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : What is IP class and number of sub- networks if the subnet mask is 255.224.0.0? a. Class A, 3 b. Class A, 8 c. Class B, 3 d. Class B, 32

Last Answer : b. Class A, 8

Description : The ability of a single network to span multiple physical networks is known as ______ a. Subnetting b. Masking c. Fragmenting d. Hopping

Last Answer : a. Subnetting

Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these

Last Answer : b. Packet switching