1.
What is the full form of ISDN?
2.
Which of the following is not an external threat to a computer or a computer network
3.
Network topology for large networks is?
4.
Which of the following allows a user to share computer programs and data in a local area network?
5.
FDDI uses which type of network topology
6.
Many desktops and operating systems include which protocol?
7.
Does a start topology stop working when a node malfunctions?
8.
The field where application and services that run on a distribution network using virtualization resource known as
9.
Centralized software in networked computer is much cheaper than buying licenses for every machine
10.
When a earthquake severs a fiber optic cable,this is a which type of network issue ?
11.
Transmission Media is present at ____________ layer of OSI model?
12.
The topology in which all devices connected to each other in a closed loop:
13.
Communication protocol used by internet is
14.
What is the format of IP address?
15.
Ethernet frame consists of ?
16.
A company requires each employee to power off his computer at the end of day, this rule was implemented of make the network
17.
which of the following local area network protocols is widley used ?
18.
Twisted Pair of cables comes under the category of _____________?
19.
PROTOCOL CONVERSION CAN NOT BE HANDLED BY A GATEWAY .
20.
in the following URL https://edu.abhayexcel.com/page/ccc-study-material/ Identify the value of protocol field .