Computer Networking 00 represents a pixel that pixel is known as : White pixel Light gray Dark gray pixel Black pixel White pixel Light gray Dark gray pixel Black pixel ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A communication network which is used by large organizations over regional, national or global area is called WAN None of these MAN Intranet LAN WAN None of these MAN Intranet LAN ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at a data link level is achieved by None of these Hamming codes cyclic redundancy codes equalization bit stuffing None of these Hamming codes cyclic redundancy codes equalization bit stuffing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? After broken links are reestablished When upper-layer protocols require high reliability In an improperly implemented redundant topology During high-traffic periods After broken links are reestablished When upper-layer protocols require high reliability In an improperly implemented redundant topology During high-traffic periods ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Satellite-Switched Time-Division Multiple Access (SS/TDMA) is All of these None of these the method of determining which device has access to the transmission medium at any time. a medium access control technique for multiple access transmission media a form of TDMA in which circuit switching is used to dynamically change the channel assignments All of these None of these the method of determining which device has access to the transmission medium at any time. a medium access control technique for multiple access transmission media a form of TDMA in which circuit switching is used to dynamically change the channel assignments ANSWER DOWNLOAD EXAMIANS APP