Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 1 and 2 1 only 3 and 4 2 only 1 and 2 1 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An ROP would be attached to a None of these half duplex channel duplex channel simplex channel full duplex channel None of these half duplex channel duplex channel simplex channel full duplex channel ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring? 8000 B frame 80,000 B frame 8 x 105 bit frame 10,000 B frame 8000 B frame 80,000 B frame 8 x 105 bit frame 10,000 B frame ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When a group of computers is connected together in a small area without the help of telephone lines, it is called Value added network (VAN) Local area network(LAN) None of these Remote communication network (RCN) Wide area network (WAN) Value added network (VAN) Local area network(LAN) None of these Remote communication network (RCN) Wide area network (WAN) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels. Find the line signaling speed (i.e., modulation rate) 4800 bands 1200 bands 9600 bands DHCP Management Console 2400 bands 4800 bands 1200 bands 9600 bands DHCP Management Console 2400 bands ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select the wrong data communication system component: Protocol Transits Medium Receiver Protocol Transits Medium Receiver ANSWER DOWNLOAD EXAMIANS APP