Which of the following is not an external threat to a computer or a computer network
in the following URL https://edu.abhayexcel.com/page/ccc-study-material/ Identify the value of protocol field .
Transmission Media is present at ____________ layer of OSI model?
What is the full form of ISDN?
FDDI uses which type of network topology
The field where application and services that run on a distribution network using virtualization resource known as
which of the following local area network protocols is widley used ?
Does a start topology stop working when a node malfunctions?
Twisted Pair of cables comes under the category of _____________?
When a earthquake severs a fiber optic cable,this is a which type of network issue ?
Many desktops and operating systems include which protocol?
The topology in which all devices connected to each other in a closed loop:
A company requires each employee to power off his computer at the end of day, this rule was implemented of make the network
PROTOCOL CONVERSION CAN NOT BE HANDLED BY A GATEWAY .
Centralized software in networked computer is much cheaper than buying licenses for every machine
Network topology for large networks is?
Which of the following allows a user to share computer programs and data in a local area network?
Ethernet frame consists of ?
What is the format of IP address?
Communication protocol used by internet is