Computer Networking Which layer 4 protocol is used for a Telnet connection? TCP UDP IP TCP/IP TCP UDP IP TCP/IP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Baseband is All of these None of these transmission of signals without modulation the simultaneous transmission of data to a number of stations a signal all of whose energy is contained within a finite frequency range All of these None of these transmission of signals without modulation the simultaneous transmission of data to a number of stations a signal all of whose energy is contained within a finite frequency range ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Correct method for full duplex mode of communication is: Both stations can transmit and receive data at the One device sends and other device receives and vic One device can send other device can only accepts. None of these Both stations can transmit and receive data at the One device sends and other device receives and vic One device can send other device can only accepts. None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want? Videotex system Microwave system None of these Teletex system Fax system Videotex system Microwave system None of these Teletex system Fax system ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is required to communicate between two computers? communications software access to transmission medium communications hardware All of these protocol communications software access to transmission medium communications hardware All of these protocol ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP