You can do it
  1. Telnet protocol uses ___________ representation for the function Synchronize.
  2. What is the default subnet mask for a class A network?
  3. A financial institution that issues the card to the purchaser is ________.
  4. What is the pattern of a preamble?
  5. A router receives an IP packet with source IP address and destination IP address…
  6. Which of the following protocol is used by Integrated Services for signaling of the reservation messages?
  7. In flags message attribute, which of the following flag indicates that message has been completed?
  8. Strings enclosed in _______ quotation marks indicate single tokens.
  9. TCP protocol is responsible for logical addressing and delivery of packets.
  10. Select the standard for token ring using token-passing media access.
  11. ________allows receiver to inform sender about the successful receiving of all the segments.
  12. ____________ developed to provide a loop-free method of exchanging routing information between autonomous…
  13. Which of the following was initially designed as a video and audio compression standard?
  14. Which class does the IP address belong to?
  15. Videoconferencing is an example for…………………… communication
  16. What is the IEEE specification for Ethernet?
  17. You have a network card with the connector in question 43, and it also has a 15 pin female connector,…
  18. _____________________ are set up to fulfill service ordering, service assurance, and billing functions.
  19. The idea of sharing one network address among the multiple physical networks can be done using the following…
  20. Which cable type is immune to outside interference and crosstalk?
  21. TCP protocol is responsible for logical addressing and delivery of packets.
  22. In Integrated services model, ________ corresponds to token bucket filter.
  23. What is the length of MARKER field in BGP message header?
  24. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…
  25. Which class does the IP address belong to?
  26. What is attenuation?
  27. In FTP, to execute a file transfer, the user begins by _________.
  28. This mapping of name to IP address is done by …………………………….
  29. What is used to boost a digital signal?
  30. ADSL uses high-speed Internet service phone lines