Computer Networking
A distributed data processing configuration in which all activities must pass through a centrally located computer is called a:

spider network
data control network
hierarchical network
None of these
ring network

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for fragment?

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
a technique used in best-effort delivery systems to avoid endlessly looping packets
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
All of these
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be?

The host has an invalid MAC address.
The router is not configured for the new host.
The VTP configuration on the switch is not updated for the new host.
The switch port the host is connected to is not configured to the correct VLAN membership.

ANSWER DOWNLOAD EXAMIANS APP