Computer Networking Packet Switch Stream (PSS) was introduced in None of these the US in 1961 the UK in 1980 None of these the US in 1961 (&) the UK in 1981 None of these the US in 1961 the UK in 1980 None of these the US in 1961 (&) the UK in 1981 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main purpose of a data link content monitor? to determine the flow of data to detect problems in protocols to determine the type of transmission used in a data link None of these to determine the type of switching used in a data link. to determine the flow of data to detect problems in protocols to determine the type of transmission used in a data link None of these to determine the type of switching used in a data link. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network which is used for sharing data, software and hardware among several users owning microcomputers is called VAN WAN None of these LAN MAN VAN WAN None of these LAN MAN ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at a data link level is achieved by bit stuffing cyclic redundancy codes equalization Hamming codes None of these bit stuffing cyclic redundancy codes equalization Hamming codes None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient ANSWER DOWNLOAD EXAMIANS APP