1.
Which of the following is not an external threat to a computer or a computer network
2.
which of the following local area network protocols is widley used ?
3.
Centralized software in networked computer is much cheaper than buying licenses for every machine
4.
Transmission Media is present at ____________ layer of OSI model?
5.
What is the format of IP address?
6.
FDDI uses which type of network topology
7.
Network topology for large networks is?
8.
A company requires each employee to power off his computer at the end of day, this rule was implemented of make the network
9.
Which of the following allows a user to share computer programs and data in a local area network?
10.
Twisted Pair of cables comes under the category of _____________?
11.
When a earthquake severs a fiber optic cable,this is a which type of network issue ?
12.
What is the full form of ISDN?
13.
The topology in which all devices connected to each other in a closed loop:
14.
Ethernet frame consists of ?
15.
Many desktops and operating systems include which protocol?
16.
in the following URL https://edu.abhayexcel.com/page/ccc-study-material/ Identify the value of protocol field .
17.
Does a start topology stop working when a node malfunctions?
18.
PROTOCOL CONVERSION CAN NOT BE HANDLED BY A GATEWAY .
19.
Communication protocol used by internet is
20.
The field where application and services that run on a distribution network using virtualization resource known as