Computer Networking The size or magnitude of a voltage or current waveform is Attenuation None of these Aloha Angle Modulation Amplitude Attenuation None of these Aloha Angle Modulation Amplitude ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following file retrieval methods use hypermedia? Archie Veronica WAIS None of these HTTP Archie Veronica WAIS None of these HTTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You telnet to a router and make your necessary changes; now you want to end the Telnet session. What command do you type in? exit close disconnect disable exit close disconnect disable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is used for modulation and demodulation? multiplexer protocols None of these modem gateway multiplexer protocols None of these modem gateway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with? access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.48.0 0.0.15.255 access-list 10 deny 172.16.64.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.48.0 255.255.240.0 access-list 10 deny 172.16.48.0 0.0.15.255 ANSWER DOWNLOAD EXAMIANS APP