Computer Networking
Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as

Amplitude modulation
None of these
Amplitude
Aloha
Amplitude-shift keying

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You type debug ip rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?

The route is inaccessible.
The route has a delay of 16 microseconds.
The route is 16 hops away.
They will all load-balance.
The route is queued at 16 messages a second.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
A T-switch is used to

rearrange the connections between computing equipment
echo every character that is received
None of these
transmit characters one at a time
control how messages are passed between computers

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true regarding access lists applied to an interface?

You can apply only one access list on any interface.
You can apply two access lists to any interface.
You can place as many access lists as you want on any interface until you run out of memory.
One access list may be configured, per direction, for each layer 3 protocol configured on an interface.

ANSWER DOWNLOAD EXAMIANS APP