Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 7 protocols Layer 5 protocols Layer 6 protocols None of these Layer 4 protocols Layer 7 protocols Layer 5 protocols Layer 6 protocols None of these Layer 4 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The area of coverage of a satellite radio beam is known as Identity Circular polarization Beam width Footprint None of these Identity Circular polarization Beam width Footprint None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be? The switch port the host is connected to is not configured to the correct VLAN membership. The router is not configured for the new host. The host has an invalid MAC address. The VTP configuration on the switch is not updated for the new host. The switch port the host is connected to is not configured to the correct VLAN membership. The router is not configured for the new host. The host has an invalid MAC address. The VTP configuration on the switch is not updated for the new host. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum distance running the lowest data rate for 802.11a? About 175 feet About 350 feet About 300 feet About 100 feet About 175 feet About 350 feet About 300 feet About 100 feet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Switching at the network layer in the Internet uses the datagram approach to: IP switching Message switching Circuit switching Packet switching IP switching Message switching Circuit switching Packet switching ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of bounded medium? None of these Coaxial cable All of these Wave guide None of these Coaxial cable All of these Wave guide ANSWER DOWNLOAD EXAMIANS APP