Featured Post Today
print this page
Latest Post
Showing posts with label Datacom. Show all posts
Showing posts with label Datacom. Show all posts

Wireless Media


Wireless media carry electromagnetic signals at radio and microwave frequencies that represent the binary digits of data communications. As a networking medium, wireless is not restricted to conductors

What is the function of line vty in router configuration?


The system supports 20 virtual tty (vty) lines for Telnet, Secure Shell Server (SSH) and FTP services. Each Telnet, SSH, or FTP session requires one vty line. You can add security to your system by

VLAN Configuration


VLAN Configuration
This section discusses the guidelines for configuring VLANs on the Catalyst switch. You will learn the steps to configure VLANs, how to enable VTP domains, how to define a trunk, how to create a VLAN, and how to verify proper VLAN

Static and Dynamic Routers


For routing between routers to work efficiently in an internetwork, routers must have knowledge of other network IDs or be configured with a default route. On large internetworks, the routing tables must

Typically, when connecting different types of devices, use a straight-through cable


Typically, when connecting different types of devices, use a straight-through cable. And when connecting the same type of device, use a crossover cable.

1. Straight-through UTP Cables

A straight-through cable has connectors on each end that are terminated the same in accordance with either the T568A or T568B standards.

Identifying the cable standard used allows you to determine if you have the right cable for the job. More importantly, it is a common practice to use the same color codes throughout the LAN for consistency in documentation.


Use straight-through cables for the following connections:
- Switch to a router Ethernet port
- Computer to switch
- Computer to hub 


Computer Fundamentals - Objective Questions (MCQ) with Solutions and Explanations - Set 3 and Answer


Following are the objective questions from Computer Fundamentals Section. Computer Fundamentals section includes the topics such as history of computers, generation of computers, classification of computers, Computer Peripherals, Storage Devices, Computer Security Systems, Computer Viruses, Computer Networking, System Analysis and Design and so on.

SET - 3


1. Which of the following devices can be sued to directly image printed text?
a. OCR
b. OMR
c. MICR
d. All of above

Computer Fundamentals - Objective Questions (MCQ) with Solutions and Explanations-Set 2 and Answer


Following are the objective questions from Computer Fundamentals Section. Computer Fundamentals section includes the topics such as history of computers, generation of computers, classification of computers, Computer Peripherals, Storage Devices, Computer Security Systems, Computer Viruses, Computer Networking, System Analysis and Design and so on.

SET - 2


1. EBCDIC stands for
a. Extended Binary Coded Decimal Interchange Code
b. Extended Bit Code Decimal Interchange Code
c. Extended Bit Case Decimal Interchange Code
d. Extended Binary Case Decimal Interchange Code

Computer Fundamentals - Objective Questions (MCQ) with Solutions and Explanations - Set 1 and Answer


Following are the objective questions from Computer Fundamentals Section. Computer Fundamentals section includes the topics such as history of computers, generation of computers, classification of computers, Computer Peripherals, Storage Devices, Computer Security Systems, Computer Viruses, Computer Networking, System Analysis and Design and so on.

SET - 1


1. UNIVAC is
a. Universal Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer

Telnet Command


The Telnet Client command prompt accepts the following commands:
CommandDescription
openUse open hostname portnumber to establish a Telnet connection to a host.
closeUse the close command to close an existing Telnet connection.
displayUse the display command to view the current settings for the Telnet client. 
The display command lists the current operating parameters. If you are in a Telnet session (connected to a Telnet server), to modify the parameters, press CTRL+]. This escapes from the Telnet session. (To return to the Telnet session, press ENTER.) The following operating parameters are available:
  • WILL AUTH (NTLM Authentication) 
  • WONT AUTH 
  • WILL TERM TYPE 
  • WONT TERM TYPE 
  • LOCALECHO off 
  • LOCALECHO on 
q

Layers with TCP/IP and OSI Model

Describe TCP/IP Mode


Basic CCNA Assessment

1. How large are IPv4 address?
- 8 bits  
- 16 bits
- 32 bits
- 34 bits
- 128 bits

IPv4 Packet Header

IPv4 Packet Header Fields: Identify the major header fields in the IPv4 protocol and describe each field's role in transporting packets

 
Copyright © 2011. Telecommunication and IT Today - All Rights Reserved
Proudly powered by http://telecomedu.blogspot.com