Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 2 only 1 and 2 3 only 1, 3 and 4 2 only 1 and 2 3 only 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Devices on one network can communicate with devices on another network via a file server None of these printer server gateway utility server file server None of these printer server gateway utility server ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP
Computer Networking MAC is a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network None of these a method access control technique or multiple-access transmission media a method of determining which device has access to the transmission medium at any time a very common bit-oriented data link protocol issued to ISO. network access standard for connecting stations to a circuit-switched network None of these a method access control technique or multiple-access transmission media a method of determining which device has access to the transmission medium at any time ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The packets switching concept was first proposed None of these All of these in the late 1950s for Defense Ministry of US in the early 1960s for military communication systems, mainly to handle speech in the late 1980s for the Defense Ministry of US. None of these All of these in the late 1950s for Defense Ministry of US in the early 1960s for military communication systems, mainly to handle speech in the late 1980s for the Defense Ministry of US. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character H is sent and the character I is received, what type of error is this? burst single-bit multiple-bit recoverable burst single-bit multiple-bit recoverable ANSWER DOWNLOAD EXAMIANS APP