Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Floppy disks typically in diameter
Floppy disks typically come in two main diameters: 3.5 inches and 5.25 inches.
Floppy disks typically come in two main diameters: 3.5 inches and 5.25 inches.
See lessWhich one of the following computer network is built on the top of another network?
A virtual private network (VPN) is built on top of another network.
A virtual private network (VPN) is built on top of another network.
See lessASCII and EBCDIC are the popular character coding systems. What does ASCII stand for?
ASCII stands for American Standard Code for Information Interchange.
ASCII stands for American Standard Code for Information Interchange.
See lessMultiplexing is used in _______
Multiplexing is used in telecommunications.
Multiplexing is used in telecommunications.
See lessThe sharing of a medium and its link by two or more devices is called _________
The sharing of a medium and its link by two or more devices is called "networking."
The sharing of a medium and its link by two or more devices is called “networking.”
See lessWAN stands for __________
WAN stands for Wide Area Network.
WAN stands for Wide Area Network.
See less_______ topology requires a multipoint connection.
Bus topology requires a multipoint connection.
Bus topology requires a multipoint connection.
See lessUser datagram protocol is called connectionless because _____________
User Datagram Protocol is called connectionless because it does not establish a dedicated end-to-end connection before sending data. It sends data packets (datagrams) without prior setup and does not guarantee delivery, order, or data integrity, allowing for faster transmission at the cost of reliabRead more
User Datagram Protocol is called connectionless because it does not establish a dedicated end-to-end connection before sending data. It sends data packets (datagrams) without prior setup and does not guarantee delivery, order, or data integrity, allowing for faster transmission at the cost of reliability.
See lessA 4 byte IP address consists of __________
A 4 byte IP address consists of 32 bits.
A 4 byte IP address consists of 32 bits.
See lessCRC stands for __________
CRC stands for Cyclic Redundancy Check.
CRC stands for Cyclic Redundancy Check.
See less