Computer Networking What is the name of the network topology in which there are bi-directional links between each possible node? Ring Mesh Star None of these Tree Ring Mesh Star None of these Tree ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which application allows a user to access and change remote files without actual transfer? FTP DNS TELNET None of these NFS FTP DNS TELNET None of these NFS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient The network becomes less efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?1. Half-duplex Ethernet operates in a shared collision domain.2. Half-duplex Ethernet operates in a private collision domain.3. Half-duplex Ethernet has higher effective throughput.4. Half-duplex Ethernet has lower effective throughput. 1,2 and 3 4 only 1 and 4 2 only 1,2 and 3 4 only 1 and 4 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands sets the secret password to Cisco? enable secret password Cisco enable secret cisco enable password Cisco enable secret Cisco enable secret password Cisco enable secret cisco enable password Cisco enable secret Cisco ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following uses network address translation? Network adapter drivers Hubs None of these Routers Windows 95 Network adapter drivers Hubs None of these Routers Windows 95 ANSWER DOWNLOAD EXAMIANS APP