Computer Networking A batch processing terminal would not include a None of these card reader CPU line printer card punch None of these card reader CPU line printer card punch ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The communication mode that supports two-way traffic but only one direction at a time is multiplex simplex half duplex None of these duplex multiplex simplex half duplex None of these duplex ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 1 and 2 1 only 3 and 4 2 only 1 and 2 1 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which address is the loopback address? 0.0.0.1 255.255.255.255 127.0.0.1 127.0.0.0 None of these 0.0.0.1 255.255.255.255 127.0.0.1 127.0.0.0 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Communication network is a continuous frequency capable of being modulated or impressed with a second signal one or more conductors that serve as a common connection for a related group of devices None of these the condition with two or more stations attempt to use the same channel at the same time a collection of interconnected functional units that provides a data communications service among stations attached to the network a continuous frequency capable of being modulated or impressed with a second signal one or more conductors that serve as a common connection for a related group of devices None of these the condition with two or more stations attempt to use the same channel at the same time a collection of interconnected functional units that provides a data communications service among stations attached to the network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? When upper-layer protocols require high reliability In an improperly implemented redundant topology During high-traffic periods After broken links are reestablished When upper-layer protocols require high reliability In an improperly implemented redundant topology During high-traffic periods After broken links are reestablished ANSWER DOWNLOAD EXAMIANS APP