Computer Networking If the ASCII character G is sent and the character D is received, what type of error is this? burst multiple-bit single-bit None of these recoverable burst multiple-bit single-bit None of these recoverable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? None of these Layer 4 protocols Layer 6 protocols Layer 5 protocols Layer 7 protocols None of these Layer 4 protocols Layer 6 protocols Layer 5 protocols Layer 7 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic? NETSTAT.EXE NBTSTAT Network Monitor ARP.EXE Performance Monitor NETSTAT.EXE NBTSTAT Network Monitor ARP.EXE Performance Monitor ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which of the following technologies is the term HFC used? DSL Frame Relay Dedicated T1 PPPoE DSL Frame Relay Dedicated T1 PPPoE ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How much power (roughly) a light-emitting diode can couple into an optical fiber? 100 microwatts 10 milliwatts 440 microwatts None of these 100 picowatts 100 microwatts 10 milliwatts 440 microwatts None of these 100 picowatts ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To avoid transmission errors, a check figure is calculated by the both A and B None of these Start and stop bit transmitting computer receiving computer both A and B None of these Start and stop bit transmitting computer receiving computer ANSWER DOWNLOAD EXAMIANS APP