Computer Networking A T-switch is used to rearrange the connections between computing equipment echo every character that is received control how messages are passed between computers None of these transmit characters one at a time rearrange the connections between computing equipment echo every character that is received control how messages are passed between computers None of these transmit characters one at a time ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands displays the configurable parameters and statistics of all interfaces on a router? show running-config show startup-config show interfaces show versions show running-config show startup-config show interfaces show versions ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the result of segmenting a network with a bridge (switch)?1. It increases the number of collision domains.2. It decreases the number of collision domains.3. It increases the number of broadcast domains.4. It decreases the number of broadcast domains.5. It makes smaller collision domains.6. It makes larger collision domains. 1, 3 and 6 3, 4 and 6 1 and 5 2, 3 and 5 1, 3 and 6 3, 4 and 6 1 and 5 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement(s) about IPv4 and IPv6 addresses are true? 1. An IPv6 address is 32 bits long, represented in hexidecimal. 2. An IPv6 address is 128 bits long, represented in decimal. 3. An IPv4 address is 32 bits long, represented in decimal. 4. An IPv6 address is 128 bits long, represented in hexidecimal. 1 and 3 only 3 and 4 2 and 4 2 only 1 and 3 only 3 and 4 2 and 4 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices? None of these Hardwiring Microwave Laser Satellite None of these Hardwiring Microwave Laser Satellite ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 4 protocols Layer 7 protocols Layer 6 protocols None of these Layer 5 protocols Layer 4 protocols Layer 7 protocols Layer 6 protocols None of these Layer 5 protocols ANSWER DOWNLOAD EXAMIANS APP