Computer Networking Which of the following medium access control technique is used for bus/tree? MAC CSMA token ring token bus None of these MAC CSMA token ring token bus None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol is used to find the hardware address of a local device? RARP ICMP ARP IP RARP ICMP ARP IP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The EIA-232 interface has _____ pins. 24 20 25 None of these 30 24 20 25 None of these 30 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol is used between E-Mail servers? None of these POP3 SMTP SNMP FTP None of these POP3 SMTP SNMP FTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be? The host has an invalid MAC address. The VTP configuration on the switch is not updated for the new host. The switch port the host is connected to is not configured to the correct VLAN membership. The router is not configured for the new host. The host has an invalid MAC address. The VTP configuration on the switch is not updated for the new host. The switch port the host is connected to is not configured to the correct VLAN membership. The router is not configured for the new host. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length. (2m - l)/mJ 2 (m - 2) m - 1 2 (2m - 1) (2m - l)/mJ 2 (m - 2) m - 1 2 (2m - 1) ANSWER DOWNLOAD EXAMIANS APP