1.
Which of the following is not an external threat to a computer or a computer network
2.
PROTOCOL CONVERSION CAN NOT BE HANDLED BY A GATEWAY .
3.
FDDI uses which type of network topology
4.
Communication protocol used by internet is
5.
Ethernet frame consists of ?
6.
Which of the following allows a user to share computer programs and data in a local area network?
7.
The field where application and services that run on a distribution network using virtualization resource known as
8.
Does a start topology stop working when a node malfunctions?
9.
When a earthquake severs a fiber optic cable,this is a which type of network issue ?
10.
Many desktops and operating systems include which protocol?
11.
Centralized software in networked computer is much cheaper than buying licenses for every machine
12.
What is the full form of ISDN?
13.
Network topology for large networks is?
14.
A company requires each employee to power off his computer at the end of day, this rule was implemented of make the network
15.
What is the format of IP address?
16.
Transmission Media is present at ____________ layer of OSI model?
17.
in the following URL https://edu.abhayexcel.com/page/ccc-study-material/ Identify the value of protocol field .
18.
Twisted Pair of cables comes under the category of _____________?
19.
which of the following local area network protocols is widley used ?
20.
The topology in which all devices connected to each other in a closed loop: