Computer Networking Transmission of computerised data from one location to another is called None of these data communication data flow data transfer data management None of these data communication data flow data transfer data management ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to create a backup configuration? copy running backup wr mem config mem copy running-config startup-config copy running backup wr mem config mem copy running-config startup-config ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign? 255.255.240.0 255.255.248.0 255.255.255.0 255.255.224.0 255.255.255.255 255.255.240.0 255.255.248.0 255.255.255.0 255.255.224.0 255.255.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To make possible the efficient on-line servicing of many teleprocessing system users on large computer systems, designers are developing All of these communication systems virtual storage systems multiprogramming systems None of these All of these communication systems virtual storage systems multiprogramming systems None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are reasons for creating OSPF in a hierarchical design?1. To decrease routing overhead2. To speed up convergence3. To confine network instability to single areas of the network4. To make configuring OSPF easier 2, 3 nd 4 1, 2 and 3 3 and 4 3 only 2, 3 nd 4 1, 2 and 3 3 and 4 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Devices interconnected by the LAN should include None of these Computers and terminals All of these mass storage device, printers and plotters bridges and gateways None of these Computers and terminals All of these mass storage device, printers and plotters bridges and gateways ANSWER DOWNLOAD EXAMIANS APP