T1 makes up 24 channels.

A. True.

B. False.

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. How many 64-Kbps channels are used on an ISDN BRI?
  2. What is the maximum size of IP header in the UDP Datagram format?
  3. Your Web server is also configured as an FTP server. What part of the data packet will tell the server…
  4. A time exceeded message is generated if ………………………………………………….
  5. ADSL uses high-speed Internet service phone lines
  6. Select the class C IP address from the following:
  7. Which of these cable is/are used to connect devices to hubs and switches.
  8. Which field in Domain Name System message format specifies the class of query?
  9. In distance vector routing an active router sends out information ………………………….
  10. Which of the following protocol was developed to overcome limitations of Routing Information Protocol…
  11. Which piece of equipment operates at both the data-link and network layers?
  12. Internet Architecture Board (IAB) governs which of the following bodies?
  13. ____________ was developed to support aggregation and summarization of routing information.
  14. Data Transmission is not a layer in the OSI model
  15. AppleTalk protocol configures hosts in zones on the network.
  16. Which of the following is the IEEE specification for wireless networks?
  17. Which of the following is required to communicate between two computers?
  18. What is the maximum length of thick Ethernet cable before a signal booster is needed?
  19. How many 64-Kbps channels are used on an ISDN BRI?
  20. The worldwide Internet is a well-known example of ------------------.
  21. What can be used in the place of DNS to resolve host names to IP addresses?
  22. When collection of various computers seems a single coherent system to its client, then it is called…
  23. In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
  24. ------------------- is/ are caused by the random motion of the electrons in a wire and is unavoidable.
  25. If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key…
  26. TCP protocol is responsible for connection-oriented communication
  27. _____________ command is used by the client to transfer the job across to the server.
  28. A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection…
  29. Network administrator checks whether all the devices connected to the end-to-end path are _________-enabled.
  30. _________ is a type of domain name queries.