Computer Networking Which of the following medium access control technique is used for bus/tree? token bus token ring None of these CSMA MAC token bus token ring None of these CSMA MAC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? 10 slots 7 slots 5 slots 14 slots None of these 10 slots 7 slots 5 slots 14 slots None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for file transfer with minimal capability and minimal overhead? RARP TELNET None of these TFTP FTP RARP TELNET None of these TFTP FTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign? 255.255.240.0 255.255.224.0 255.255.252.0 255,255.248.0 255.255.192.0 255.255.240.0 255.255.224.0 255.255.252.0 255,255.248.0 255.255.192.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following network types have a designated router and a backup designated router assigned? 1. Broadcast 2. Point-to-point 3. NBMA 4. NBMA point-to-point 3 and 4 All of these 1 and 3 1, 2 and 3 3 and 4 All of these 1 and 3 1, 2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data are sent over pin _____ of the EIA-232 interface. 3 2 All of these 4 3 2 All of these 4 ANSWER DOWNLOAD EXAMIANS APP