Computer Networking Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM? None of these Frequency-shift keying Amplitude modulation Frequency modulation Frequency-division multiple access None of these Frequency-shift keying Amplitude modulation Frequency modulation Frequency-division multiple access ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server? RARP RDP None of these X.25 RIP RARP RDP None of these X.25 RIP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A medium access control technique for multiple access transmission media is Attenuation None of these Aloha Amplitude Angle modulation Attenuation None of these Aloha Amplitude Angle modulation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking 00 represents a pixel that pixel is known as : Black pixel Dark gray pixel Light gray White pixel Black pixel Dark gray pixel Light gray White pixel ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Where are EIGRP successor routes stored? In the routing table and the topology table In the routing table only In the neighbor table only In the topology table only In the routing table and the neighbor table In the routing table and the topology table In the routing table only In the neighbor table only In the topology table only In the routing table and the neighbor table ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 1 and 2 3 and 4 2 and 4 1 and 3 1 and 2 3 and 4 2 and 4 1 and 3 ANSWER DOWNLOAD EXAMIANS APP