Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 4 protocols Layer 7 protocols None of these Layer 6 protocols Layer 5 protocols Layer 4 protocols Layer 7 protocols None of these Layer 6 protocols Layer 5 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Sales persons and other employees of the company who spend much of their time away from their offices but keep in touch with their company's microcomputers or main frame computers over telephone lines are called field workers None of these telecommuters company directors teleprocessors field workers None of these telecommuters company directors teleprocessors ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Error rate Error detecting code None of these Cyclic redundancy check Checksum Error rate Error detecting code None of these Cyclic redundancy check Checksum ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A communication network which is used by large organizations over regional, national or global area is called MAN Intranet LAN None of these WAN MAN Intranet LAN None of these WAN ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transmission signal coding method of TI carrier is called Binary Manchester None of these NRZ Bipolar Binary Manchester None of these NRZ Bipolar ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 only 1, 3 and 4 3 only 3 and 4 1 only 1, 3 and 4 3 only ANSWER DOWNLOAD EXAMIANS APP