Computer Networking Which of the following is private IP address? 172.15.14.36 12.0.0.1 168.172.19.39 192.168.24.43 172.15.14.36 12.0.0.1 168.172.19.39 192.168.24.43 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What operates in the Data Link and the Network layer? Router Brouter None of these NIC Bridge Router Brouter None of these NIC Bridge ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases. Cable terminators do not reflect the signal properly Cable terminators do not absorb the signal properly Repeaters cannot increase the signal strength sufficiently "Line echo" occurs due to the impedance of the cable Network collisions occur Cable terminators do not reflect the signal properly Cable terminators do not absorb the signal properly Repeaters cannot increase the signal strength sufficiently "Line echo" occurs due to the impedance of the cable Network collisions occur ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? SMTP None of these UDP VMTP X.25 SMTP None of these UDP VMTP X.25 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A computer that handles resource sharing and network management in a local area network. Select the best fit for answer: Three Network operating system Virtual Private Network Network Server OSI Three Network operating system Virtual Private Network Network Server OSI ANSWER DOWNLOAD EXAMIANS APP
Computer Networking MAC is a method of determining which device has access to the transmission medium at any time network access standard for connecting stations to a circuit-switched network a method access control technique or multiple-access transmission media a very common bit-oriented data link protocol issued to ISO. None of these a method of determining which device has access to the transmission medium at any time network access standard for connecting stations to a circuit-switched network a method access control technique or multiple-access transmission media a very common bit-oriented data link protocol issued to ISO. None of these ANSWER DOWNLOAD EXAMIANS APP