Computer Networking Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS? 120 10 12 1200 None of these 120 10 12 1200 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as User Agent bridges mail gateway Gateways None of these User Agent bridges mail gateway Gateways None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which one of the following network uses dynamic or adaptive routing? TYMNET ARPANET SNA(IBM's System Network Architechture) None of these TYMNET ARPANET SNA(IBM's System Network Architechture) None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 2 and 3 1 and 4 3, 4 and 5 1 and 3 2 and 3 1 and 4 3, 4 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? The logical domain address for the workstation An alias for the computer name A physical address that is randomly assigned each time the computer is started A logical address that identifies the workstation A physical address that is assigned by the manufacturer The logical domain address for the workstation An alias for the computer name A physical address that is randomly assigned each time the computer is started A logical address that identifies the workstation A physical address that is assigned by the manufacturer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols? IPSec Cable xDSL VPN HDLC IPSec Cable xDSL VPN HDLC ANSWER DOWNLOAD EXAMIANS APP