Computer Networking What function does a serial interface perform in data communication? None of these Decodes incoming signals into computer data Converts parallel data into a stream of bits Converts analog signals into digital signals Converts serial data into audio signals None of these Decodes incoming signals into computer data Converts parallel data into a stream of bits Converts analog signals into digital signals Converts serial data into audio signals ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A default Frame Relay WAN is classified as what type of physical network? Point-to-point Non-broadcast multi-access Broadcast multi-access Non-broadcast multipoint Point-to-point Non-broadcast multi-access Broadcast multi-access Non-broadcast multipoint ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The simultaneous transmission of data to a number of stations is known as None of these broadcast Band width Analog transmission Aloha None of these broadcast Band width Analog transmission Aloha ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use? 255.255.255.192 255.255.255.252 255.255.255.248 255.255.255.240 255.255.255.224 255.255.255.192 255.255.255.252 255.255.255.248 255.255.255.240 255.255.255.224 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? Time sharing Token passing Collision detection Switched repeaters CSMA/CD Time sharing Token passing Collision detection Switched repeaters CSMA/CD ANSWER DOWNLOAD EXAMIANS APP