How do you know which bits are host bit in a subnet mask?
Since a subnet mask is used to separate the network id from the host id, any 1 bits indicate the network portion and the 0 bits indicate host portion. As an example, in the subnet mask:
255.255.0.0
This indicates the first two octets are used for the network, and the last two octets (ipV4) are used for host portion of an address.
What is the purpose of the word 'blah'?
Blah
* noun # worthless nonsense; drivel. # Blahs A general feeling of depression, discomfort, or dissatisfaction. * adj # dull and uninteresting. # low in spirit or health.
What does the enable command do in a cisco router?
The "enable" command will bring the privilege level from user exec to privileged exec.
Example:
R1>
R1>enable
R1#
because the tcp is reliable
What is a fully peered network?
All peers must be at the very same level. There must not be a server or any peer neither indexing nor monitoring the network.
Why is MAC address filtering considered a poor choice in securing a WLAN?
MAC addresses are easily spoofed.
You need to wait to see if the problem occurs again before you can evaluate the effect of your changes
Which mode enables you to view and change the configuration of a Cisco router?
Global Configuration Mode.
Bits Per Second: 9600
Data Bits: 8
Parity: None
Stop Bits: 1
Flow Control: None
What are uses of computers in banks besides cash points and clearing cheques?
state two uses of computers in banking
What are the answers to prove it questions?
For a project to be created in Microsoft Project 2003, all of the following are necessary except for which one?
What is a plug switch for a load out spout?
A switch that will alarm the main control room or operator that the material being conveyed through the load out spout has backed up. This will typically be near the discharge. Can be applicable to spouts, conveyors, bucket elevators, etc...
Which two criteria does a switch use to select the root bridge?
Bridge Priority and MAC address is used to break a tie.
When should distance vector routing be used?
Distance vector routing is used when the network is simple and has no hierarchical design. Examples of distance vector routing protocols are RIP and IGRP.
At what point in the PPP connection process does the authentication phase occur?
before LCP begins the link establishment process