Computer Networking The birthplace of the World Wide Web is considered to be None of these the Department of Defense ARPA Netscape CERN None of these the Department of Defense ARPA Netscape CERN ANSWER DOWNLOAD EXAMIANS APP
Computer Networking HDLC (High-level Data Link Control) is a method of determining which device has access to the transmission medium at any time a very common bit-oriented data link protocol issued by ISO. None of these a method access control technique for multiple-access transmission media network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time a very common bit-oriented data link protocol issued by ISO. None of these a method access control technique for multiple-access transmission media network access standard for connecting stations to a circuit-switched network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are layers in the TCP/IP model?1. Application2. Session3. Transport4. Internet5. Data Link6. Physical 2, 3 and 5 1, 3 and 4 1 and 2 3, 4 and 5 2, 3 and 5 1, 3 and 4 1 and 2 3, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following device is used with an X.25 network to provide service to asynchronous terminals gateway repeater Packet assembler/disassemble None of these bridges gateway repeater Packet assembler/disassemble None of these bridges ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What can cause a problem with communication with a client by name but not by IP address? The default gateway None of these Static files such as an LMHOSTS file or a DNS database The IP address Subnet mask The default gateway None of these Static files such as an LMHOSTS file or a DNS database The IP address Subnet mask ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient ANSWER DOWNLOAD EXAMIANS APP