Computer Networking A T-switch is used to None of these control how messages are passed between computers transmit characters one at a time echo every character that is received rearrange the connections between computing equipment None of these control how messages are passed between computers transmit characters one at a time echo every character that is received rearrange the connections between computing equipment ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 3 and 4 1 only 1 and 2 2 only 3 and 4 1 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is private IP address? 12.0.0.1 168.172.19.39 172.15.14.36 192.168.24.43 12.0.0.1 168.172.19.39 172.15.14.36 192.168.24.43 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11a standard? 2.4Gbps 5Gbps 5GHz 2.4GHz 2.4Gbps 5Gbps 5GHz 2.4GHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS? 10 1200 120 12 None of these 10 1200 120 12 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Microprogramming is None of these programming of minicomputers macro programming of microcomputers control unit programming assembly language programming None of these programming of minicomputers macro programming of microcomputers control unit programming assembly language programming ANSWER DOWNLOAD EXAMIANS APP