Computer Networking
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?

Layer 4 protocols
Layer 5 protocols
Layer 7 protocols
Layer 6 protocols
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which three statements are true about the operation of a full-duplex Ethernet network?1. There are no collisions in full-duplex mode.2. A dedicated switch port is required for each full-duplex node.3. Ethernet hub ports are preconfigured for full-duplex mode.4. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.5. The host network card and the switch port must be capable of operating in full-duplex mode.

2 and 4
2, 3 and 4
5 only
1, 2, and 5

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for encapsulation?

All of these
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
None of these
a technique used in best-effort delivery systems to avoid endlessly looping packets.

ANSWER DOWNLOAD EXAMIANS APP