Computer Networking
Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?

one bit or any odd number of bits inverted in a block of data during transmission
two bits or any even number of bits inverted in a byte during transmission
two bits or any even number of bits inverted in a block during transmission
one bit or any odd number of bits inverted in a byte during transmission
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer

The network becomes more efficient
After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
The network becomes less efficient
The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500
An additional token is added for every 1,000 nodes

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?

Flood the network with the frame
Discard it and send an error message back to the originating host
Add the destination to the MAC address table and then forward the frame
Add the source address and port to the MAC address table and forward the frame out the destination port

ANSWER DOWNLOAD EXAMIANS APP