Answer:
6 address lines
Explanation:
The computation of the number of address lines needed is shown below:
Given that
Total memory = 64MB
= 
=
Also we know that in 1MB RAM the number of chips is 6
So, the number of address lines is
i..e 26 address lines
And, the size of one chip is equivalent to 1 MB i.e. 
For a single 1MB chips of RAM, the number of address lines is

Therefore 6 address lines needed
Answer
5 bits
Explanation
A bit is the least or the smallest unit of data in a computer. They are the units of information in information theory, consisting of the amount of information required to specify one of two alternatives 0 and 1. This is because A bit has a single binary value, either 0 or 1
If you use roman alphabet A to Z lets use log 2(26)=4.7 bits. when you round off it will be 5 bits.
Answer:
A) False
Explanation:
Extranet
An extranet acts as a shared network, disseminating information present on the intranet. That is, if a private intranet shares some of its content with other users (be they sellers, customers, etc.), this shared network is what we call the extranet.
Intranet
Today, companies are looking for tools and methods to align internal communication, reduce costs, and centralize information and files. The intranet is one of these tools, which works restricted to a specific audience, such as a company. This way, collaborators can access it with their specific username and password.
The intranet is, then, a closed and internal network, and still allows the use of more communication protocols besides HTTP. Intranet access is typically done on a local server and a local network, which we call LAN, which means Local Area Network installed within the company.
This internal network connects users, allowing information exchange, file and document management, centralizing communication between users. With this tool, you can quickly and securely and efficiently connect companies and departments.
Answer:
Promiscuous mode
Explanation:
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addresse…
✓ Promiscuous mode