Computer Networking
Which of the following technique is used for fragment?

one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
All of these
None of these
a technique used in best-effort delivery systems to avoid endlessly looping packets

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Terminals are required for

realtime, distributed processing, and manager inquiry
realtime, timesharing, and message switching
realtime, batch processing, and timesharing
realtime, timesharing, and distributed processing
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You type the following command into the router and receive the following output:Router#show serial 0/0 ^% Invalid input detected at '^' marker.Why was this error message displayed?

You need to be in privileged mode.
Part of the command is missing.
The router does not have a serial0/0 interface.
You cannot have a space between serial and 0/0.

ANSWER DOWNLOAD EXAMIANS APP