Computer Networking A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring? 10,000 B frame 8000 B frame 80,000 B frame 8 x 105 bit frame 10,000 B frame 8000 B frame 80,000 B frame 8 x 105 bit frame ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data are sent over pin _____ of the EIA-232 interface. 4 3 2 All of these 4 3 2 All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Suppose that you have a customer who has a central HQ and six branch offices. They anticipate adding six more branches in the near future. They wish to implement a WAN technology that will allow the branches to economically connect to HQ and you have no free ports on the HQ router. Which of the following would you recommend? PPP ISDN Frame Relay HDLC PPP ISDN Frame Relay HDLC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it is cabled using fiber-optic cable Token-Ring, because it uses a MAU Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it is cabled using fiber-optic cable Token-Ring, because it uses a MAU Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 5 protocols Layer 6 protocols Layer 4 protocols None of these Layer 7 protocols Layer 5 protocols Layer 6 protocols Layer 4 protocols None of these Layer 7 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site? 240 224 248 192 252 240 224 248 192 252 ANSWER DOWNLOAD EXAMIANS APP