Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Which of the following below is/are the capability of ICMP protocol?
C. Both band d
C. Both band d
See lessWhat is the full form of CAN?
D. both A and B
D. both A and B
See lessWhat is the full form of URL?
B. Uniform Resource Locator
B. Uniform Resource Locator
See lessThe process of assigning the IP address for specific times to the various hosts by DHCP is called?
D. Lease
D. Lease
See less10Base5, 10Base2, 10BaseT are types of?
C. Ethernet
C. Ethernet
See lessTELNET used protocol for data connection
A. TCP
A. TCP
See lessWhich of the following protocol below are suited for email retrieval?
D. Both and b above
D. Both and b above
See lessToken Ring is a data link technology for?
C. LAN
C. LAN
See lessA stream socket provides communications between a client and a server
D. other
D. other
See lessUDP is an unreliable protocol.
A. True
A. True
See less