Computer Networking Which application allows a user to access and change remote files without actual transfer? NFS None of these TELNET DNS FTP NFS None of these TELNET DNS FTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer: Telecommunications software Cellular phone systems Telecommunications processors Fiber optic cables Telecommunications software Cellular phone systems Telecommunications processors Fiber optic cables ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: data control network hierarchical network spider network ring network None of these data control network hierarchical network spider network ring network None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When creating a pool of global addresses, which of the following can be used instead of the netmask command? block-size prefix-length / (slash notation) no mask block-size prefix-length / (slash notation) no mask ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select the correct cable that transport signals in the form of light: Fiber optic cable Coaxial Cable Shielded Twisted Pair cable Twisted-Pair cable Fiber optic cable Coaxial Cable Shielded Twisted Pair cable Twisted-Pair cable ANSWER DOWNLOAD EXAMIANS APP