Computer Network
Computer Network
www.latestcarernews.com
Click Here for Answers
1 – D / 2 – C / 3 – D / 4 – B / 5 – C / 6 – C / 7 – A / 8 – D / 9 – A / 10 – B
www.latestcarernews.com
Click Here for Answers
1 – C / 2 – D / 3 – A / 4 – A / 5 – D / 6 – A / 7 – C / 8 – B / 9 – A / 10 – D
3-5. What is the size of Network bits & Host bits of Class A of IP address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits 24
C. Network bits 7, Host bits 23
D. Network bits 8, Host bits 23
3-6. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link
3-7. The Internet is an example of
A. Cell switched network
B. circuit switched network
C. Packet switched network
D. All of above
3-8. What does protocol defines?
A. Protocol defines what data is communicated.
B. Protocol defines how data is communicated.
C. Protocol defines when data is communicated.
D. All of above
3-9. What is the uses of subnetting?
A. It divides one large network into several smaller ones
B. It divides network into network classes
C. It speeds up the speed of network
D. None of above
3-10. Repeater operates in which layer of the OSI model?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
www.latestcarernews.com
Multiple C===hoice Questions of Computer Networking
4-1. What is the benefit of the Networking?
A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
4-2. Which of the following is not the Networking Devices?
A. Gateways
B. Linux
C. Routers
D. Firewalls
4-3. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
4-4. Which of the following can be Software?
A. Routers
B. Firewalls
C. Gateway
D. Modems
4-5. What is the use of Ping command?
A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in a Application
D. To test a Pinter Quality
4-6. MAC Address is the example of
A. Transport Layer
B. Data Link Layer
C. Application Layer
D. Physical Layer
4-7. Routing tables of a router keeps track of
A. MAC Address Assignments
B. Port Assignments to network devices
C. Distribute IP address to network devices
D. Routes to use for forwarding data to its destination
4-8. Layer-2 Switch is also called
A. Multiport Hub
B. Multiport Switch
C. Multiport Bridge
D. Multiport NIC
4-9. Difference between T568A and T568B is
A. Difference in wire color
B. Difference in number of wires
C. Just different length of wires
D. Just different manufacturer standards
4-10. The meaning of Straight-through Cable is
A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted
www.latestcarernews.com
5-2 What is the Demilitarized Zone?
A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
5-3 What is the full form of RAID ?
A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks
C. Random Access of Independent Disks
D. Random Access of Important Disks
5-4 What is the maximum header size of an IP packet?
A. 32 bytes
B. 64 bytes
C. 30 bytes
D. 60 bytes
5-5 What is the size of Host bits in Class B of IP address?
A. 04
B. 08
C. 16
D. 32
5-6 What is the usable size of Network bits in Class B of IP address?
A. 04
B. 08
C. 14
D. 16
5-7 In which type of RAID, data is mirrored between two disks.
A. RAID 0
B. RAID 1
C. RAID 2
D. RAID 3
5-8 What do you mean by broadcasting in Networking?
A. It means addressing a packet to all machine
B. It means addressing a packet to some machine
C. It means addressing a packet to a particular machine
D. It means addressing a packet to except a particular machine
5-9 Which of the following is/are Protocols of Application?
A. FTP
B. DNS
C. Telnet
D. All of above
5-10 Which of the following protocol is/are defined in Transport layer?
A. FTP
B. TCP
C. UDP
D. B & C
www.latestcarernews.com
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above
6-4. The class-based addressing is also known as
A. Modern Model
B. Classful Model
C. Classless Model
D. Heterogeneous Model
6-5. Which of the following is correct in CIDR?
A. Class A includes Class B network
B. There are only two networks
C. There are high & low class network
D. There is no concept of class A, B, C networks
6-6. What is the size of Source and Destination IP address in IP header?
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
6-7. Which of the following is reliable communication?
A. TCP
B. IP
C. UPD
D. All of them
6-8. What is the typical range of Ephemeral ports?
A. 1 to 80
B. 1 to 1024
C. 80 to 8080
D. 1024 to 65535
6-9. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message
6-10. What is the natural mask for a class C Network?
A. 255.255.255.1
B. 255.255.255.0
C. 255.255.255.254
D. 255.255.255.255
www.latestcarernews.com
2. Two devices are in network if
a) a process in one device is able to exchange information with a process in
another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
3. Which one of the following computer network is built on the top of another
network?
a) prior network
b) chief network
c) prime network
d) overlay network
View Answer
Answer:d
Explanation:None.
6. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
www.latestcarernews.com
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
10. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer
Answer:b
Explanation:None.
www.latestcarernews.com
This set of Computer Networks Questions & Answers focuses on “Physical Media”.
www.latestcarernews.com
c) 2n*51.8
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
8) Geostationary satellites
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
View Answer
Answer: a
Explanation: They are placed in orbit at 36,000km above Earth’s surface.
www.latestcarernews.com
Answer:b
Explanation:None.
www.latestcarernews.com
c) sent from root server to all servers
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) none of the mentioned
View Answer
8. An alternative of javascript on windows platform is
a) VBScript
b) ASP.NET
c) JSP
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
www.latestcarernews.com
1. Multiple object can be sent over a TCP connection between client and server
in
a) persistent HTTP
b) nonpersistent HTTP
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
5. In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting
for the corresponding responses
www.latestcarernews.com
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
View Answer
Answer:a
Explanation:None.
8. In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
www.latestcarernews.com
Answer:c
Explanation:None.
3. MAC address is of
1) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
View Answer
Answer:d
Explanation:None.
4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission
www.latestcarernews.com
parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
www.latestcarernews.com
Answer:d
Explanation:None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64
octets is called
a) short frame
b) run frame
c) mini frame
d) man frame
View Answer
Answer:b
Explanation:None.
www.latestcarernews.com
3) This topology requires multipoint connection
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Answer: d
Explanation: None.
6) Expand WAN
a) World area network
b) Wide area network
c) Web area network
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
www.latestcarernews.com
1) A local telephone network is an example of a _______ network
a) Packet switched
b) Circuit switched
c) both of the mentioned
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
3) If there are N routers from source to destination, total end to end delay in sending packet P(L->number of
bits in the packet R-> transmission rate)
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
View Answer
Answer: b
Explanation: None.
5) The resources needed for communication between end systems are reserved for the duration of session
between end systems in ________
www.latestcarernews.com
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
View Answer
Answer: b
Explanation: None.
6) As the resouces are reserved between two communicating end systems in circuit switching, this is achieved
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
View Answer
Answer: b
Explanation: None.
www.latestcarernews.com
2. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
View Answer
Answer: c
Explanation: TOS-type of service identifies the type of packets.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.
4. If the value in protocol field is 17, the transport layer protocol used is ____.
a) TCP
b) UDP
c) Either of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: For TCP it is 6.
www.latestcarernews.com
c) TTl value
d) None of the mentioned
View Answer
Answer: a
Explanation: flag=0 indicates that it is the last fragment.
www.latestcarernews.com
b) 128bits
c) 8bytes
d) 100bits
View Answer
Answer: b
Explanation: An IPv6 address is 128 bits long.
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer
Answer: c
Explanation: This field enables to have different types of IP datagram.
www.latestcarernews.com
d) All of the mentioned
View Answer
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by
intervening IPv4 routers. The best solution here is
a) use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tuunel.
9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by
bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
www.latestcarernews.com
d) 64 to 79
View Answer
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
3. Internet access by transmitting digital data over the wires of a local telephone network is provided by
a) leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
www.latestcarernews.com
c) ISP end point
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
View Answer
www.latestcarernews.com
Answer:c
Explanation:None.
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) none of the mentioned
View Answer
Answer:d
Explanation:None.
www.latestcarernews.com
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
5. DHCP uses UDP port ____ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
View Answer
Answer:b
Explanation:None.
www.latestcarernews.com
Answer:d
Explanation:None.
8. After obtaining the IP address, to prevent the IP conflict the client may use
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the
network.
a) MAC address
b) IP address
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
www.latestcarernews.com
Computer Networks Questions & Answers – Access Networks
This set of Computer Networks Questions & Answers focuses on “Access Networks”.
www.latestcarernews.com
5) HFC contains
a) Fibre cable
b) Coaxial cable
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
6) Choose the statement which is not applicable for cable internet access
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
View Answer
Answer: d
Explanation: In cable access analog signal is converted to digital signal by CMTS.
8) StarBand provides
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
View Answer
Answer: d
Explanation: None.
www.latestcarernews.com
c) Cable
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
www.latestcarernews.com
b) twisted pair cable
c) optical fiber
d) electrical cable
View Answer
Answer:c
Explanation:None.
3. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
View Answer
Answer:a
Explanation:None.
4. The portion of physical layer that interfaces with the media access control sublayer is called
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
www.latestcarernews.com
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
8. The physical layer translates logical communication requests from the ______ into hardware specific
operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
View Answer
Answer:a
Explanation:None.
www.latestcarernews.com
Answer:d
Explanation:None.
www.latestcarernews.com
Answer:b
Explanation:None.
5. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
6. Multidestination routing
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
7. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
View Answer
Answer:d
Explanation:None.
www.latestcarernews.com
9. The network layer protocol of internet is
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
1. Transport layer aggregates data from different applications into a single stream before passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
View Answer
Answer:a
Explanation:None.
www.latestcarernews.com
3. User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
www.latestcarernews.com
c) structured stream transport
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
www.latestcarernews.com
c) network time protocol
d) internet relay chat
View Answer
Answer:a
Explanation:None.
2. Which one of the following allows a user at one site to establish a connection to another site and then pass
keystrokes from local host to remote host?
a) HTTP
b) FTP
c) telnet
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
www.latestcarernews.com
d) base 8 encoding
View Answer
Answer:a
Explanation:None.
6. Which one of the following is an internet standard protocol for managing devices on IP network?
a) dynamic host configuration protocol
b) simple newtwork management protocol
c) internet message access protocol
d) media gateway protocol
View Answer
Answer:b
Explanation:None.
8. Which protocol is a signalling communication protocol used for controlling multimedia communication
sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
www.latestcarernews.com
Answer:c
Explanation:None.
10. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
www.latestcarernews.com
Answer: d
Explanation: HTTP is a protocol.
4) Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
6) E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
View Answer
Answer: c
Explanation: Because it can work with available throughput.
www.latestcarernews.com
8) Which of the following is an application layer service ?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
9) To deliver a message to the correct application program running on a host, the _______ address must be
consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
www.latestcarernews.com
b) HTTP
c) FTP
d) SIP
View Answer
Answer: a
Explanation: None.
1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______
a) 4
b) 1
c) 5
d) None of the mentioned
View Answer
Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
3. The time taken by a packet to travel from client to server and then back to the client is called ____
a) STT
b) RTT
c) PTT
d) None of the mentioned
View Answer
Answer: b
Explanation: RTT stands for round-trip time.
www.latestcarernews.com
b) Second
c) Third
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
5. In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.
a) 2
b) 1
c) 4
d) 3
View Answer
Answer: b
Explanation: None.
7. The values GET, POST, HEAD etc are specified in ____ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
View Answer
Answer: a
Explanation: It is specified in the method field of request line in the HTTP request message.
8. The ______ method when used in the method field, leaves entity body empty.
a) POST
b) GET
c) Both of the mentioned
www.latestcarernews.com
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
9. The HTTP response message leaves out the requested object when _____ method is used
a) GET
b) POST
c) HEAD
d) PUT
View Answer
Answer: c
Explanation: None.
www.latestcarernews.com
Answer: c
Explanation: None.
13. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
1) Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
3) ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
www.latestcarernews.com
d) Both a and b
View Answer
Answer: d
Explanation: None.
5) If you want to find the number of routers between a source and destination, the utility to be used is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer: d
Explanation: None.
www.latestcarernews.com
Answer: a
Explanation: None.
1) Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
www.latestcarernews.com
Answer: b
Explanation: Control connection and data connection.
5) If 5 files are transfered from server A to client B in the same session. The number of TCP connection
between A and B is
a) 5
b) 10
c) 2
d) 6
View Answer
Answer: d
Explanation: 1 control connection and other 5 for five file transfers.
6) FTP server
a) Mantains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
7) The commands, from client to server, and replies, from server to client, are sent across the control
connection in ____ bit ASCII format
a) 8
b) 7
c) 3
d) 5
View Answer
www.latestcarernews.com
Answer: b
Explanation: None.
www.latestcarernews.com
Answer: b
Explanation: None.
3) The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections
at the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: c
Explanation: None.
4)The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: b
Explanation: None.
www.latestcarernews.com
6) Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
www.latestcarernews.com
3. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
www.latestcarernews.com
c) wired local area network
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
www.latestcarernews.com
b) network layer
c) application layer
d) session layer
View Answer
Answer:b
Explanation:None.
www.latestcarernews.com
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
www.latestcarernews.com
Answer:a
Explanation:None.
10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
www.latestcarernews.com
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
www.latestcarernews.com
Answer:b
Explanation:None.
www.latestcarernews.com
Answer:b
Explanation:None.
2. WiMAX provides
a) simplex communication
b) half duplex communication
c) full duplex communication
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
www.latestcarernews.com
6. For encryption, WiMAX supports
a) advanced encryption standard
b) triple data encryption standard
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
7. WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. Which one of the following frequency is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
www.latestcarernews.com
c) 2.5 GHz
d) 3.5 GHz
View Answer
Answer:b
Explanation:None.
www.latestcarernews.com