Computer Networking Segmentation of a data stream happens at which layer of the OSI model? Data Link Transport Network Physical Data Link Transport Network Physical ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at the data link level is achieved by Hamming Code Cyclic Redundancy Code Bit Stuffing Equalization Hamming Code Cyclic Redundancy Code Bit Stuffing Equalization ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.0.0 0.0.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When two computers communicate with each other, they send information back and forth. If they are separated by a reasonable distance, they can send and receive the information through a direct cable connection which is called a null-modem connection. Presently what is the maximum distance in metres permitted in this null-modem connection? 30 None of these 80 100 150 30 None of these 80 100 150 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To connect a computer with a device in the same room, you might be likely to use a ground station None of these All of these a dedicated line a coaxial cable a ground station None of these All of these a dedicated line a coaxial cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Identify the odd term amongst the following group: Microwaves Optical fibre None of these Twisted pair wire Coaxial cable Microwaves Optical fibre None of these Twisted pair wire Coaxial cable ANSWER DOWNLOAD EXAMIANS APP