Bissoy.com
Login
Doctors
Medicines
MCQs
Q&A
Ask
Merit Test
Questions
Courses
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
4
8
15
16
None of the above
LohaHridoy
0
Edit
4
views
2025-01-04 04:42
1
Answers
AhmedNazir
Answer: Option 3
Let'
0
Thanks
4
views
Answered
2022-09-01 13:21
Report
Edit
Call
Related Questions
What is sent to the user via HTTP, invoked using the HTTP protocol on the user's computer, and run on the user's computer as an application?
1 Answers
5
Views
According to maximum power transfer theorem, the maximum power is absorbed by one network from another network when?
1 Answers
5
Views
When a bogie negotiates a curve, reduction in adhesion occurs resulting in sliding. Thus sliding is acute when?
1 Answers
4
Views
A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table?
1 Answers
5
Views
What do you call a computer on a network that requests files from another computer?
1 Answers
5
Views
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size Choose the best answer?
1 Answers
15
Views
What protocol does PPP use to identify the Network layer protocol?
1 Answers
6
Views
What standard, protocol or language was generalized to become a standard protocol for sending messages of any type, using any protocol?
1 Answers
6
Views
A man used to rob the computers and He is active only for quarter of a year. He robs three computers Vayu, Tejas and Agni. January was unfortunate month for Tejas. Vayu was stolen in March. Now he used three tools Pliers, Screwdriver and Hook to rob all the parts from the computer and Make His own computer. He Rob Monitor from Tejas but Does not use hook. He robs Printer from Vayu and Use Pliers. And from Third Computer he robs Keyboard. i) In which month was Agni stolen ii) Which tool was used for Tejas?
1 Answers
5
Views
You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose?
1 Answers
4
Views
কোরআন
হাদিস
চাকুরি প্রস্তুতি
বিশ্ববিদ্যালয় ভর্তি
মেডিকেল SBA
12
এইচএসসি
10
এসএসসি
8
জেএসসি
এক্সাম দিয়ে মেধা যাচাই করুন
Job Preparation (1125)
Admission (754)
এসএসসি (10)
এইচএসসি (5)
Login Required
You need to log in to continue.
Login
Cancel
Download Required
You need to download the app to make a call.
Download
Cancel