Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Amplitude-shift keying Aloha Amplitude Amplitude modulation None of these Amplitude-shift keying Aloha Amplitude Amplitude modulation None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What operates in the Data Link and the Network layer? Bridge NIC None of these Router Brouter Bridge NIC None of these Router Brouter ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases. Cable terminators do not absorb the signal properly Network collisions occur Cable terminators do not reflect the signal properly "Line echo" occurs due to the impedance of the cable Repeaters cannot increase the signal strength sufficiently Cable terminators do not absorb the signal properly Network collisions occur Cable terminators do not reflect the signal properly "Line echo" occurs due to the impedance of the cable Repeaters cannot increase the signal strength sufficiently ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as User Agent mail gateway bridges Gateways None of these User Agent mail gateway bridges Gateways None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11a standard? 5GHz 2.4Gbps 2.4GHz 5Gbps 5GHz 2.4Gbps 2.4GHz 5Gbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following uses network address translation? Routers None of these Hubs Windows 95 Network adapter drivers Routers None of these Hubs Windows 95 Network adapter drivers ANSWER DOWNLOAD EXAMIANS APP