...
August 30, 2024

Computer-Networks

Question 434 Which of the following statements about Secure Shell Protocol (SSH) is FALSE? A SSH cannot be used for file transfer and e-mail tasks. B […]
August 30, 2024

Computer-Networks

Question 435 Assume that source S and destination D are connected through five intermediate routers R1, R2,R3,R4 and R5. Determine how many times each packet has […]
August 30, 2024

Computer-Networks

Question 437 Match the following. List I List II I)Attenuation P) Loss of energy II)Shannon capacity Q) Changes in shape of the signal Ill)Nyquist bit rate […]
August 30, 2024

Application-Layer-Protocol

Question 8 Which of the following protocols is built on client-server architecture and uses separate control and data connections between the client and the server? A […]
error: Alert: Content selection is disabled!!