Computer Networking An error-detecting code inserted as a field in a block of data to be transmitted is known as Frame check sequence Checksum None of these flow control Error detecting code Frame check sequence Checksum None of these flow control Error detecting code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The data communication support should include, but is not restricted to terminal support, electronic mail and voice grams. file and database access file transfer and transaction processing All of these terminal support, electronic mail and voice grams. file and database access file transfer and transaction processing All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer An additional token is added for every 1,000 nodes The network becomes less efficient The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes less efficient The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The frequency range : 300 kHz to 3 MHz is used for AM radio transmission TV transmission FM radio transmission microwave communications, satellite and radar None of these AM radio transmission TV transmission FM radio transmission microwave communications, satellite and radar None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.192 255.255.255.224 255.255.255.255 255.255.255.248 255.255.255.240 255.255.255.192 255.255.255.224 255.255.255.255 255.255.255.248 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding RIPv2? It has the same timers as RIPv1. It converges faster than RIPv1. It is harder to configure than RIPv1. It has a lower administrative distance than RIPv1. It has the same timers as RIPv1. It converges faster than RIPv1. It is harder to configure than RIPv1. It has a lower administrative distance than RIPv1. ANSWER DOWNLOAD EXAMIANS APP