Computer Networking A front-end processor is a user computer system a minicomputer that relieves main-frame computers at a computer centre of communications control functions a processor in a large-scale computer that executes operating system instructions preliminary processor of batch jobs. None of these a user computer system a minicomputer that relieves main-frame computers at a computer centre of communications control functions a processor in a large-scale computer that executes operating system instructions preliminary processor of batch jobs. None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? 14 15 30 16 14 15 30 16 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an IEEE standard for frame tagging? 802.1Q 802.3U 802.3Z ISL 802.1Q 802.3U 802.3Z ISL ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router?1. 172.16.1.1002. 172.16.1.1983. 172.16.2.2554. 172.16.3.0 1 only 3 and 4 only 2 and 5 only None of these 2 and 3 only 1 only 3 and 4 only 2 and 5 only None of these 2 and 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The synchronous modems are more costly than the asynchronous modems because they operate with a larger bandwidth None of these they contain clock recovery circuits they transmit the data with stop and start bits. they produce large volume of data they operate with a larger bandwidth None of these they contain clock recovery circuits they transmit the data with stop and start bits. they produce large volume of data ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient An additional token is added for every 1,000 nodes The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient An additional token is added for every 1,000 nodes The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP