Computer Networking How many non-overlapping channels are available with 802.11g? 23 3 40 12 23 3 40 12 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Token-Ring, because it uses a MAU Ethernet, because it is cabled using fiber-optic cable Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Token-Ring, because it uses a MAU Ethernet, because it is cabled using fiber-optic cable Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer: Bandwidth alternatives Extranets Inter organizational networks None of these Switching alternating Bandwidth alternatives Extranets Inter organizational networks None of these Switching alternating ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many Character per sec(7bits + 1parity) can be transmitted over a 2400 bps line if the transfer is synchronous (1 "Start" and 1 "stop" bit)? 250 275 300 240 250 275 300 240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What two multicast addresses does OSPFv3 use?1. FF02::A2. FF02::93. FF02::54. FF02::6 1 and 3 3 and 4 2 only 3 only 1 and 3 3 and 4 2 only 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It describes when a router sets the metric for a downed link to infinity. ANSWER DOWNLOAD EXAMIANS APP