Computer Networking What type of RJ45 UTP cable do you use to connect a PC's COM port to a router or switch console port? Crossover cable Rolled Straight-through Crossover with a CSU/DSU Crossover cable Rolled Straight-through Crossover with a CSU/DSU ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The encoding method specified in the EIA-232 standard is _____. None of these Differential Manchester NRZ-L NRZ-I Manchester None of these Differential Manchester NRZ-L NRZ-I Manchester ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a global unicast address? Packets addressed to a unicast address are delivered to a single interface. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. Packets addressed to a unicast address are delivered to a single interface. These are like private addresses in IPv4 in that they are not meant to be routed. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? 10 slots None of these 7 slots 5 slots 14 slots 10 slots None of these 7 slots 5 slots 14 slots ANSWER DOWNLOAD EXAMIANS APP
Computer Networking CSMA (Carrier Sense Multiple Access) is a very common bit-oriented data link protocol issued by ISO. a method of determining which device has access to the transmission medium at any time None of these a method access control technique for multiple-access transmission media. network access standard for connecting stations to a circuit-switched network a very common bit-oriented data link protocol issued by ISO. a method of determining which device has access to the transmission medium at any time None of these a method access control technique for multiple-access transmission media. network access standard for connecting stations to a circuit-switched network ANSWER DOWNLOAD EXAMIANS APP