Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 4 protocols None of these Layer 6 protocols Layer 7 protocols Layer 5 protocols Layer 4 protocols None of these Layer 6 protocols Layer 7 protocols Layer 5 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An example of a medium-speed, switched communications service is All of these Dataphone 50 Series 1000 DDD None of these All of these Dataphone 50 Series 1000 DDD None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which two statements describe the IP address 10.16.3.65/23?1. The subnet address is 10.16.3.0 255.255.254.0.2. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.3. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.4. The broadcast address of the subnet is 10.16.3.255 255.255.254.0. 1 and 3 2, 3 and 4 2 and 4 2 and 5 only 1, 2 and 4 1 and 3 2, 3 and 4 2 and 4 2 and 5 only 1, 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command displays RIP routing updates? debug ip route show ip route debug ip rip show protocols debug ip route show ip route debug ip rip show protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A decrease in magnitude of current, voltage, a power of a signal in transmission between points, is known as Amplitude Carrier None of these Aloha Attenuation Amplitude Carrier None of these Aloha Attenuation ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring? 8000 B frame 8 x 105 bit frame 10,000 B frame 80,000 B frame 8000 B frame 8 x 105 bit frame 10,000 B frame 80,000 B frame ANSWER DOWNLOAD EXAMIANS APP