Computer Networking Modem is used in data transmission. When was it invented and in which country? 1965, Germany 1950, USA 1963, USA None of these 1950, Japan 1965, Germany 1950, USA 1963, USA None of these 1950, Japan ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Internet-like networks between a company and its business partners. Select the best fit for answer: Switching alternating Bandwidth alternatives Inter organizational networks Extranets Switching alternating Bandwidth alternatives Inter organizational networks Extranets ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one? 255.255.255.240 255.255.252.0 225.255.254.0 255.255.255.252 255.255.255.240 255.255.252.0 225.255.254.0 255.255.255.252 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of a standard IP access list? access-list standard 1.1.1.1 access-list 1 permit 172.16.10.1 255.255.0.0 access-list 110 permit host 1.1.1.1 access-list 1 deny 172.16.10.1 0.0.0.0 access-list standard 1.1.1.1 access-list 1 permit 172.16.10.1 255.255.0.0 access-list 110 permit host 1.1.1.1 access-list 1 deny 172.16.10.1 0.0.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which three statements are true about the operation of a full-duplex Ethernet network?1. There are no collisions in full-duplex mode.2. A dedicated switch port is required for each full-duplex node.3. Ethernet hub ports are preconfigured for full-duplex mode.4. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.5. The host network card and the switch port must be capable of operating in full-duplex mode. 5 only 2 and 4 2, 3 and 4 1, 2, and 5 5 only 2 and 4 2, 3 and 4 1, 2, and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient The network becomes more efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient The network becomes more efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP