Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Amplitude-shift keying Aloha Amplitude Amplitude modulation None of these Amplitude-shift keying Aloha Amplitude Amplitude modulation None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will copy the IOS to a backup host on your network? transfer IOS to 172.16.10.1 copy flash tftp copy run start copy start tftp transfer IOS to 172.16.10.1 copy flash tftp copy run start copy start tftp ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the followings is used in communications is referred to as unshielded twisted-pair (UTP)? Fiber-optic cable None of these Coaxial cable Twisted-pair cable Fiber-optic cable None of these Coaxial cable Twisted-pair cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be None of these 20 5 10 32 None of these 20 5 10 32 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following network access standard is used for connecting stations to a circuit-switched network? None of these X.75 X.3 X.25 X.21 None of these X.75 X.3 X.25 X.21 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? 240 248 224 192 252 240 248 224 192 252 ANSWER DOWNLOAD EXAMIANS APP