Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? Switched repeaters Token passing Collision detection Time sharing CSMA/CD Switched repeaters Token passing Collision detection Time sharing CSMA/CD ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to run the new 802.1w on your switches. Which of the following would enable this protocol? Switch(config)# spanning-tree mode 802.1w Switch# spanning-tree mode rapid-pvst Switch# spanning-tree mode 802.1w Switch(config)# spanning-tree mode rapid-pvst Switch(config)# spanning-tree mode 802.1w Switch# spanning-tree mode rapid-pvst Switch# spanning-tree mode 802.1w Switch(config)# spanning-tree mode rapid-pvst ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient An additional token is added for every 1,000 nodes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which file transfer protocol uses UDP? FTP TELNET NFS None of these TFTP FTP TELNET NFS None of these TFTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n) POS terminal batch processing terminal data collection terminal intelligent terminal None of these POS terminal batch processing terminal data collection terminal intelligent terminal None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How long is an IPv6 address? 64 bits 32 bits 128 bits 128 bytes 64 bits 32 bits 128 bits 128 bytes ANSWER DOWNLOAD EXAMIANS APP