Computer Networking What are the data transmission channels available for carrying data from one location to another? Voiceband Narrowband Broadband All of these None of these Voiceband Narrowband Broadband All of these None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Multiplexers often waste the output link capacity while statistical multiplexers optimize its use None of these Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Multiplexers often waste the output link capacity while statistical multiplexers optimize its use None of these Statistical multiplexers need buffers while multiplexers do not need buffers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table? IGRP has a lower administrative distance. RIP has a higher metric value for that route. IGRP has a faster update timer. The IGRP route has fewer hops. IGRP has a lower administrative distance. RIP has a higher metric value for that route. IGRP has a faster update timer. The IGRP route has fewer hops. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The first step in troubleshooting many problems is to verify which of the following? The WINS server is running None of these The subnet mask is valid TCP/IP is installed correctly on the client The BDC is operable The WINS server is running None of these The subnet mask is valid TCP/IP is installed correctly on the client The BDC is operable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Aloha None of these Amplitude Amplitude modulation Amplitude-shift keying Aloha None of these Amplitude Amplitude modulation Amplitude-shift keying ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of bounded medium? All of these None of these Wave guide Coaxial cable All of these None of these Wave guide Coaxial cable ANSWER DOWNLOAD EXAMIANS APP