Computer Networking Which of the following frequency ranges is used for AM radio transmission? High Frequency : 3 MHz to 30 MHz Medium Frequency : 300 kHz to 3 MHz Very Low Frequency : 3 kHz to 30 kHz None of these Very High Frequency : 30 MHz to 300 MHz High Frequency : 3 MHz to 30 MHz Medium Frequency : 300 kHz to 3 MHz Very Low Frequency : 3 kHz to 30 kHz None of these Very High Frequency : 30 MHz to 300 MHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a global unicast address? These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which fields are contained within an IEEE Ethernet frame header?1. Source and destination MAC address2. Source and destination network address3. Source and destination MAC address and source and destination network address4. FCS field 2 and 3 only 3 only 2 only 1 and 4 2 and 3 only 3 only 2 only 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The application layer of a network defines the user's port into the network All of these None of these consists of software being run on the computer connected to the network establishes, maintains, and terminates virtual circuits defines the user's port into the network All of these None of these consists of software being run on the computer connected to the network establishes, maintains, and terminates virtual circuits ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient An additional token is added for every 1,000 nodes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command would you place on interface on a private network? ip outside global ip nat inside ip inside local ip nat outside ip outside global ip nat inside ip inside local ip nat outside ANSWER DOWNLOAD EXAMIANS APP