Computer Networking What does 192 translate to in binary? 11000000 11 111110 1111 None of these 11000000 11 111110 1111 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of flow control? To provide a means for the receiver to govern the amount of data sent by the sender. To regulate the size of each segment. To ensure that data is retransmitted if an acknowledgment is not received. To reassemble segments in the correct order at the destination device. To provide a means for the receiver to govern the amount of data sent by the sender. To regulate the size of each segment. To ensure that data is retransmitted if an acknowledgment is not received. To reassemble segments in the correct order at the destination device. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host? 172.16.112.0 172.16.96.0 172.16.255.0 172.16.0.0 172.16.112.0 172.16.96.0 172.16.255.0 172.16.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following frequency ranges is used for AM radio transmission? Medium Frequency : 300 kHz to 3 MHz Very High Frequency : 30 MHz to 300 MHz Very Low Frequency : 3 kHz to 30 kHz None of these High Frequency : 3 MHz to 30 MHz Medium Frequency : 300 kHz to 3 MHz Very High Frequency : 30 MHz to 300 MHz Very Low Frequency : 3 kHz to 30 kHz None of these High Frequency : 3 MHz to 30 MHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The first step in troubleshooting many problems is to verify which of the following? The WINS server is running The subnet mask is valid None of these TCP/IP is installed correctly on the client The BDC is operable The WINS server is running The subnet mask is valid None of these TCP/IP is installed correctly on the client The BDC is operable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP