Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 only 3 and 4 1 and 2 2 only 1 only 3 and 4 1 and 2 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to ping the loopback address of your local host(with IPv6). What will you type? ping 0.0.0.0 ping 127.0.0.1 ping ::1 trace 0.0.::1 ping 0.0.0.0 ping 127.0.0.1 ping ::1 trace 0.0.::1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking TCP is: Connection orientated and unreliable Connectionless and unreliable Operates at the Data Link layer Connection orientated and reliable None of these Connection orientated and unreliable Connectionless and unreliable Operates at the Data Link layer Connection orientated and reliable None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With telecommunications and a personal computer you can None of these "download" free public domain programs All of these order goods at a substantial discount send letters to be printed and delivered by the post office None of these "download" free public domain programs All of these order goods at a substantial discount send letters to be printed and delivered by the post office ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 7 protocols Layer 4 protocols None of these Layer 5 protocols Layer 6 protocols Layer 7 protocols Layer 4 protocols None of these Layer 5 protocols Layer 6 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following refers to the terms "residual error rate"? signal to noise ratio divided by the ratio of energy per bit to noise per hertz None of these the number of bit errors per twenty four hours of continuous operation on an asynchronous line the probability that one or more errors will be detected when an error detection mechanism is used The probability that one or more errors will be undetected when an error detection scheme is used signal to noise ratio divided by the ratio of energy per bit to noise per hertz None of these the number of bit errors per twenty four hours of continuous operation on an asynchronous line the probability that one or more errors will be detected when an error detection mechanism is used The probability that one or more errors will be undetected when an error detection scheme is used ANSWER DOWNLOAD EXAMIANS APP