Computer Networking A T-switch is used to None of these rearrange the connections between computing equipment echo every character that is received control how messages are passed between computers transmit characters one at a time None of these rearrange the connections between computing equipment echo every character that is received control how messages are passed between computers transmit characters one at a time ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it is cabled using fiber-optic cable Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it is cabled using fiber-optic cable Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a global unicast address? These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets addressed to a unicast address are delivered to a single interface. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A terminal multiplexer has six 1200 bps terminals and 'n' 300bps terminals connected to it. The outgoing line is 9600bps. What is the maximum value of n? 28 4 16 8 28 4 16 8 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An example of a medium-speed, switched communications service is DDD Dataphone 50 All of these Series 1000 None of these DDD Dataphone 50 All of these Series 1000 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases. Cable terminators do not reflect the signal properly Cable terminators do not absorb the signal properly "Line echo" occurs due to the impedance of the cable Network collisions occur Repeaters cannot increase the signal strength sufficiently Cable terminators do not reflect the signal properly Cable terminators do not absorb the signal properly "Line echo" occurs due to the impedance of the cable Network collisions occur Repeaters cannot increase the signal strength sufficiently ANSWER DOWNLOAD EXAMIANS APP