Computer Networking A batch processing terminal would not include a line printer CPU card punch None of these card reader line printer CPU card punch None of these card reader ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A T-switch is used to None of these transmit characters one at a time echo every character that is received rearrange the connections between computing equipment control how messages are passed between computers None of these transmit characters one at a time echo every character that is received rearrange the connections between computing equipment control how messages are passed between computers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which one of the following is true regarding VLANs? VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed. Two VLANs are configured by default on all Cisco switches. VTP is used to send VLAN information to switches in a configured VTP domain. You should not have more than 10 switches in the same VTP domain. VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed. Two VLANs are configured by default on all Cisco switches. VTP is used to send VLAN information to switches in a configured VTP domain. You should not have more than 10 switches in the same VTP domain. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches? Broadcast storms will occur on the switched network. The MAC forward/filter table will not update on the switch. The switches will automatically load-balance between the two links. The routing tables on the switches will not update. Broadcast storms will occur on the switched network. The MAC forward/filter table will not update on the switch. The switches will automatically load-balance between the two links. The routing tables on the switches will not update. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network with a subnet of 172.16.17.0/22. Which is the valid host address? 172.16.17.1 255.255.255.252 172.16.18.255 255.255.252.0 172.16.0.1 255.255.240.0 172.16.20.1 255.255.254.0 172.16.17.1 255.255.255.252 172.16.18.255 255.255.252.0 172.16.0.1 255.255.240.0 172.16.20.1 255.255.254.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Synchronous protocols None of these are generally used by personal computers transmit characters one at a time are more reliable allow faster transmission than asynchronous protocols do None of these are generally used by personal computers transmit characters one at a time are more reliable allow faster transmission than asynchronous protocols do ANSWER DOWNLOAD EXAMIANS APP