Computer Networking What is the frequency range of the IEEE 802.11g standard? 5GHz 2.4GHz 2.4Gbps 5Gbps 5GHz 2.4GHz 2.4Gbps 5Gbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols uses both TCP and UDP? SMTP Telnet DNS FTP SMTP Telnet DNS FTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame? Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port Flood the network with the frame Discard it and send an error message back to the originating host Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port Flood the network with the frame Discard it and send an error message back to the originating host ANSWER DOWNLOAD EXAMIANS APP
Computer Networking RS-232-G is an interface standard between Data terminal Equipment and Data Circuit Terminating Equipment None of these specifies only the mechanical characteristics of an interface by providing a 25-pin connector requires only 7 pin out of 25 in order to transmit digital data over public telephone lines is an interface between two data circuit terminating equipment as examplified by a local and remote modem is an interface standard between Data terminal Equipment and Data Circuit Terminating Equipment None of these specifies only the mechanical characteristics of an interface by providing a 25-pin connector requires only 7 pin out of 25 in order to transmit digital data over public telephone lines is an interface between two data circuit terminating equipment as examplified by a local and remote modem ANSWER DOWNLOAD EXAMIANS APP
Computer Networking MAC is a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time None of these a method access control technique or multiple-access transmission media a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time None of these a method access control technique or multiple-access transmission media ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP