What is the home page loading time at Dhaka when server at Dhaka? Input answer in milliseconds (ms) Your answer What is home page loading time at Dhaka when server at Dubai? Input answer in milliseconds (ms) Your answer
Q: q39- Which statement is true of a MAC address? Select one: A. The first 24 bits are assigned by…
A: The solution is given below for the above given question:
Q: Which Cloud Foundry component is used to collect component metrics and stream application logs to an…
A: Which Cloud Foundry component is used to collect component metrics and stream application logs to an…
Q: Which of the following line coding scheme is self-synchronizing? * NRZ-I NRZ-L O AMI DMAN The figure…
A: Quesiton 1 :- First let's understand what is NRZ - l and NRZ - L NRZ stand for the Non return to…
Q: Application developer has permission to decide the following on transport layer side a. Transport…
A: Application developer has permission to decide the following on transport layer side Transport…
Q: An Internet service provider sets it's base rate for data transfers in a given month according to…
A: An Internet service provider sets it's base rate for data transfers in a given month according to…
Q: What is the home page loading time at Dhaka when server at Dhaka?
A: If the Server is in Dhaka, The home page loading time at Dhaka will be (0.01 and 0.25 seconds.)
Q: 5. An Internet provider charges for megabytes according to monthly traffic volume: Traffic (MB) Rate…
A: The Answer for the given question start from step-2.
Q: . Client side error indication series is
A: Given To know about Client side error indication series is
Q: transmission error that will not be detected by the Internet checksum
A: The Internet checksum, a transmission error that will not be detected by the Internet checksum
Q: O CALL JMP O JMP, IRET O JMP, RET O CALL RET
A: A subroutine is a grouping of program directions that play out a particular undertaking, bundled as…
Q: Assume a web page consists of 1 base HTML page of 10 KB and 20 images of 50 KB each. If approximate…
A: Tranmission time for HTML Page, TTpage = 10KB / 5Mbps = (10 x 103 x 8 bits) / (5 x 106 bits/s) = 16…
Q: Suppose Bob is downloading files from an FTP server by sending a request to the server and the…
A: I have answer this question in step 2.
Q: Which RG raging is used for Ticknet
A: RG-8 is used for 10base5 Ethernet networking (also called Ticknet).
Q: Which of the following is NOT the basic element of Modbus message
A: Option d Error checking is not present in the elements of modbus message
Q: Using Hamming code the receiver has received the following encoded message; what is the right…
A: The number of redundant bits can be calculated using the following formula: Here, m=15 2r >=…
Q: A service delivered to users through a cloud-hosted web server has a target response time of 200…
A: We need to find the percentage increase in the amount of time for processing the response is…
Q: Mention all protocols and function when appear 404 message when requesting and reply
A: Given that Mention all protocols and function when appear 404 message when requesting and reply 1.…
Q: Which three types of media access control protocols are there? Put them side by side.
A: The three media access control protocols are: 1. ALOHA 2. CSMA 3. CSMA/CD & CSMA/CA ALOHA It…
Q: Q. Which are the two sublayers of the DataLink layer? A. LLC - Logical Link Control Layer B. MAC -…
A: The data link layer is the protocol layer in a program that handles the moving of data into and out…
Q: How many digits of the DNIC (Data Network Identification Code) identify the country? A. first three…
A: The X.121 address is made up of the international data number, which consists of two fields: the 4…
Q: Create ACLs and apply them to the correct interfaces to meet the following requirements: Block…
A: 1)Block 192.168.11.1 access to the internet access-list 1 deny tcp 192.168.1.1 any eq any 2) Allow…
Q: What is the and default gateway. difference between default route
A: Default gateway is normally utilized on switches that are not L3 switches/routers or on "has". It…
Q: Start Set collision number to zero (N=0) Sense the carrier Wait back off time (k x Time slot) No…
A: The CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection, is a protocol in…
Q: . Which of the following statement is correct? a. Satellite transponders contain a device that echos…
A: Here, Four options are given.
Q: Who is responsible to add entries in the forwarding table? Describe two alternatives to add entries…
A: Given: Who is responsible to add entries in the forwarding table? Describe two alternatives to add…
Q: Which open source terminal emulation protocol is comparable to RDP?
A: Given: Which open source terminal emulation protocol is comparable to RDP?
Q: Match the following port numbers with their uses : (a) 23 (i) World wide web (b) 25 (ii) Remote…
A: answer is option d d) (ii) (iv) (i) (iii) a) 23 Remote login b) 25 Email c) 80 World Wide Web…
Q: Bandwidth is divided into equal time slots in Select one: O a. Pure Aloha O b. Slotted Aloha O C.…
A: Answer in step 2
Q: Start Set collision number to zero (N=0) Sense the carrier Wait back off time (k x Time slot) No…
A: In the OSI network model, Data link layer is divided into the Media Access Control layer and the…
Q: Which is(are) true about Macro layer in 5G (check all that apply) assign channels to users O provide…
A: Macro layer in 5G does all 4 mentioned works.
Q: Which of the OSI layers handles each of the following: provides synchronization between the tasks…
A: Seven layers of OSI network model: Physical layer Data link layer Network layer Transport layer…
Q: on gateway interface is used to A. generate executable files from web content by web server B.…
A: Common gateway interface is used to A. generate executable files from web content by web server B.…
Q: scribe what does the following terminal command do: nmap -p 22
A: Lets see the solution.
Q: Which one is characteristic of data traffic? ★ Data traffic consumes lots of network resources. Data…
A: For good voice quality, the amount of latency should be less than 150 milliseconds and packet loss…
Q: A student in Kuwait, connected to the internet via a 350 Mb/s connection retrieves a 300 KB web page…
A: Transmission time is the time required to put the file on the transmission link. It is given as (in…
Q: q3-To implement F(A,B,C,D)=m2+m4+m7 using a decoder, what is the size of this decoder? 3x8 4x16 1x2…
A: А deсоder is а deviсe thаt generаtes the оriginаl signаl аs оutрut frоm the соded…
Q: The bandwidth-delay product defines the number of bits that can fill the link. Why?
A: Required: The bandwidth-delay product defines the number of bits that can fill the link. Why?
Q: When forwarding a frame to its destination, do the following devices (i) hub (ii) Bridge and (iii)…
A: Solution:-- 1)The given in the question is to provide while the forwarding in a frame to the…
Q: Which protocol,. TOP or UDR is below feature belong? Reliable delivery: High overhead…
A: 1) tranmission control protocol 2) UDP
Q: Which of the following is a more preferred application layer protocol for loT?
A: IPV4 protocol is Not used for application protocol in IoT. The HTTP protocol is not Used for…
Q: What type of information is normally provided in a Layer 1 frame is described below.
A: In OSI model it describes 7 layers that system use to communicate over a network. It helps visualize…
Q: Identify the type of message, a message is sent to all host using 11.255.255.255.
A: We are given an IP and we are going to find out if it is : Limited broadcast multicast Di
Q: A host attached to a cable modem is generating the following kinds of traffic. What kind of service…
A: from modem to host, network traffic is routed through the cable modem. For each modem request, the…
Q: A user complains that he cannot access a particular website, although he is able to access other…
A: Open System Interconnection (OSI) model OSI is a reference model which is used between the network…
Q: The sender window size is 4000 bytes and MSS= 100 bytes. When data is transmitted 8 Ack's came. Then…
A: Given: The sender window size is 4000 bytes and MSS= 100 bytes. When data is transmitted 8 Ack's…
Q: Make two suggestions for enhancements to the IP packet PDU structure.
A: IP also known as Internet Protocol. IP packets: They are the most critical and fundamental…
Q: Spark write a A Distributed Cloud Edge Computing Application that performs sales predictions. Please…
A: Distributed Cloud Edge Computing Application: Edge-computing is compatible with both hybrids and…
Q: Match the following port numbers with their uses : (a) 23 (i) World wide web (b) 25 (ii) Remote…
A: Ports are used for communication between 2 devices and servers.
Q: ow many bytes are used for a port number?
A: Required: How many bytes are used for a port number?
Step by step
Solved in 2 steps
- Please write the code in the nodejs and use the localhost server to show the current date and time by creating a function. Please write the code only in Node js the address: - http://localhost:8080/v Please write the code in the nodejs and use the localhost server to show the current date and time by creating a function. Please write the code only in Node js the address: - http://localhost:8080/v Please write the code in the nodejs and use the localhost server to show the current date and time by creating a function. Please write the code only in Node js the address: - http://localhost:8080/Complete the frames (x & y) given below with appropriate port, IP and MAC addresses. The sender Host E has two applications running; one for email with port number 49254 and the other for accessing the web server with port number 52167. The frame x is intended for the BRACU Web server and frame y is coming from the Email Server. (MAC addresses are alphabets and IP addresses are numbers) Port 80 Frame y K/93 BRACU Web Frame x Server BRACU G/51 Router ISP Router I/91 Port 25 H/52 F/25 Hub-PT Hubo A/20 Switc-PT Switho Swich-P Syitch1 Enail Server J/92 B/21 E/24 C/22 D/23 SenderPLEASE HELP ME NORMALISE THIS TABLE User_ID User_Name MSE_ID Rec_Date Subject Text Srvr_ID Server_Name 2301 Smith 54101 05/07 Meeting Today There is... 3786 IMAP05 2301 Smith 54098 07/12 Promotions I like to... 3786 IMAP05 2301 Smith 54445 10/06 Next Assignment Your next... 3786 IMAP05 5607 Jones 54101 05/07 Meeting Today There is... 6001 IMAP08 5607 Jones 54512 06/07 Lunch? Can you... 6001 IMAP08 5607 Jones 54660 12/01 Jogging Today? Can you... 6001 IMAP08 7773 Walsh 54101 05/07 Meeting Today There is... 9988 EMEA01 7773 Walsh 54554 03/17 Stock Quote The latest... 9988 EMEA01 22 Patel 54101 05/07 Meeting Today There is... 2201 EMEA09 22 Patel 54512 06/07 Lunch? Can we... 2201 EMEA09
- Determine the number of page table entries (PTES) that are needed for the following combinations of virtual address size (n) and page size (P): n P=2P| Number of PTES 16 4K 16 8K 32 4K 32 8KHow you will create new user using terminal in Ubuntu? Add screenshots of all steps for new user creation including terminal and Login page in Answer sheet. Every student has to create new user as of his/her arid number for example (19-arid-1121).What is true when a web browser (http client) contacts a web server (http server)?Group of answer options The client has a random port number while the server normally has port 80 The client normally has port 80 while the server has a random port number. Both the client and the server normally have port 80 Both the client and the server normally have a random port number
- Q10: Complete the frames (x & y) given below with appropriate port, IP and MAC addresses. The sender Host E has two applications running; one for email with port number 49254 and the other for accessing the web server with port number 52167. The frame x is intended for the BRACU Web server and frame y is coming from the Email Server. (MAC addresses are alphabets and IP addresses are numbers) [5] Port 80 Frame y K/93 BRACU G/51 Router BRACU Web ISP Frame x Server Router I/91 Port 25 Н 52 F/25 Hub-PT Hubo A/20 Switc-PT Switcho Swich-Pr Syitch1 Email Server J/92 B/21 E/24 C/22 D/23 Sender Frame X D. Mac S. MAC D. IP S. IP D. Port S. Port Data Trailer Frame Y D. Mac S. MAC D. IP S. IP D. Port S. Port Data Trailer ** *******END***: *** *** *****Q10: Complete the frames (x & y) given below with appropriate port, IP and MAC addresses. The sender Host E has two applications running; one for email with port number 49254 and the other for accessing the web server with port number 52167. The frame x is intended for the BRACU Web server and frame y is coming from the Email Server. (MAC addresses are alphabets and IP addresses are numbers) Port 80 BRACU Web Frame x Server A/20 B/21 Frame X D. Mac Frame Y D. Mac Switch-PT Switcho C/22 S. MAC S. MAC BRACU G/51, Router F/25 Frame y Switch-P Switch1 D/23 D. IP D. IP ISP Router 1/91 H/52 E/24 Sender S. IP S. IP Hub-PT Hubo D. Port D. Port K/93 Port 25 Email Server 3/92 S. Port S. Port Data Data Trailer TrailerWhat is the home page loading time at Dhaka when server at Dhaka?
- When a URL contains a "?" followed by a key value pair, what is this called? String JSON Query String Parameters Network configurations can easily be migrated from data centers to the cloud because: Internet standards are the same throughout the world None of these response options All cloud providers have adopted the same networking constructs and standards Networking devices have standard configurations that can be exported and re-used in new devices What is a Blue/Green deployment? A deployment model running two identical productions at any time, only one of which is live and serving production traffic A method of comparing two versions of an application against each other to determine which performs better A deployment method that takes resources out of stack, deploys the new changes, and brings it back A deployment pattern for rolling out releases to a subset of systems Which migration strategy should be used to quickly move an application from local a data center to the cloud? W…Given the following commands, explain what the purpose of the command is and give a typical use case for each: Show interface Show arp tracert Example: the “ping” command, uses the Internet Control Message Protocol and verifies layer 3 connectivity, and would typically be used by a Network Administrator who wants to test connectivity between devices when a new device has been added to a network or as a troubleshooting method when experiencing connectivity issues.After execution of the following code: MOVLW 38h ADDLW 2Fh Select one: Fini a. C=1 DC=1 Tim Z30 b. C=0 DC=1 Z=0 C. C=1 DC=1 Z=1 d. C=0 DC=1 Z-1 Previous page Next page CR O G