Computer Networking Number of bits per symbol used in Baudot code is 5 None of these 8 1 9 5 None of these 8 1 9 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router? show ip access-lists show interface Ethernet 0 show ip interface Ethernet 0 show access-lists show ip access-lists show interface Ethernet 0 show ip interface Ethernet 0 show access-lists ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Statistical multiplexers need buffers while multiplexers do not need buffers None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Statistical multiplexers need buffers while multiplexers do not need buffers None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively? POP3 SMTP IMAP DHCP 2 POP3 SMTP IMAP DHCP 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are layers in the TCP/IP model?1. Application2. Session3. Transport4. Internet5. Data Link6. Physical 2, 3 and 5 1, 3 and 4 1 and 2 3, 4 and 5 2, 3 and 5 1, 3 and 4 1 and 2 3, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP