Computer Networking Which of the following medium access control technique is used for bus/tree? token bus MAC token ring CSMA None of these token bus MAC token ring CSMA None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Transmission of computerised data from one location to another is called data communication None of these data transfer data management data flow data communication None of these data transfer data management data flow ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface?1. show version2. show protocols3. show interfaces4. show controllers5. show ip interface 3 and 4 only 2, 3 and 5 1, 2 and 4 None of these 3 and 4 only 2, 3 and 5 1, 2 and 4 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When creating a pool of global addresses, which of the following can be used instead of the netmask command? / (slash notation) block-size prefix-length no mask / (slash notation) block-size prefix-length no mask ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate? 3 Kbps 12 Kbps 24 Kbps. 6 Kbps 3 Kbps 12 Kbps 24 Kbps. 6 Kbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? Thicknet coax Thinnet coax Fiber-optic cable Category 5 UTP cable Thicknet coax Thinnet coax Fiber-optic cable Category 5 UTP cable ANSWER DOWNLOAD EXAMIANS APP