What is attenuation?

A. cable noise

B. cable shortage

C. loss of signal strength

D. unwanted signals on the network

Related Questions

  1. If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization…
  2. The general form of the SMTP destination address is ________________.
  3. A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection…
  4. _____________ command is used by the client to transfer the job across to the server.
  5. Which Layer is Responsible for Congestion Control?
  6. ________allows receiver to inform sender about the successful receiving of all the segments.
  7. Using a class B address maximum of …………………networks can be…
  8. AppleTalk protocol configures hosts in zones on the network.
  9. In Secure Electronic Transaction, the description of the purchase and cost is contained in ________…
  10. You wish to install a 100BaseT network. What type of cabling will you use?
  11. UDP datagram has a header, which is of ________.
  12. address is reserved for internal loopback functions.
  13. address is reserved for internal loopback functions.
  14. ADSL uses high-speed Internet service phone lines
  15. In Secure Electronic Transaction, the description of the purchase and cost is contained in ________…
  16. Videoconferencing is an example for…………………… communication
  17. Which directory service is used in Windows 2000 Server?
  18. TCP protocol is responsible for logical addressing and delivery of packets.
  19. Your Web server is also configured as an FTP server. What part of the data packet will tell the server…
  20. Which of the following pieces of equipment will receive a packet from one port and forward that packet…
  21. E-mail is an example of ………………………… mode…
  22. Which of the following is used for testing the data-link connection in a PPP network?
  23. Which of the following IEEE specifications uses CSMA/CD?
  24. What is the distance limitation of Cat5 UTP?
  25. ___________ is based on resources that are present within the Diffserv region.
  26. If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key…
  27. Which class does the IP address belong to?
  28. In which of the following states after selecting a mailbox, actions can be taken against the mail within…
  29. What layer of the OSI protocol reference model does a bridge operate under?
  30. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…

Please do not use chat terms. Example: avoid using "grt" instead of "great".