Computer Networking Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach? None of these IPV4 IPV5 IPV6 None of these IPV4 IPV5 IPV6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many broadcast domains are created when you segment a network with a 12-port switch? 2 1 5 12 2 1 5 12 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking CSMA (Carrier Sense Multiple Access) is a method of determining which device has access to the transmission medium at any time a method access control technique for multiple-access transmission media. None of these a very common bit-oriented data link protocol issued by ISO. network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time a method access control technique for multiple-access transmission media. None of these a very common bit-oriented data link protocol issued by ISO. network access standard for connecting stations to a circuit-switched network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Satellite-Switched Time-Division Multiple Access (SS/TDMA) is a medium access control technique for multiple access transmission media All of these None of these a form of TDMA in which circuit switching is used to dynamically change the channel assignments the method of determining which device has access to the transmission medium at any time. a medium access control technique for multiple access transmission media All of these None of these a form of TDMA in which circuit switching is used to dynamically change the channel assignments the method of determining which device has access to the transmission medium at any time. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? one bit or any odd number of bits inverted in a block of data during transmission None of these two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a block of data during transmission None of these two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a byte during transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are layers in the TCP/IP model?1. Application2. Session3. Transport4. Internet5. Data Link6. Physical 3, 4 and 5 2, 3 and 5 1, 3 and 4 1 and 2 3, 4 and 5 2, 3 and 5 1, 3 and 4 1 and 2 ANSWER DOWNLOAD EXAMIANS APP