Computer Networking Which of the following summation operation is performed on the bits to check an error-detecting code? Checksum None of these Codec Attenuation Coder-decoder Checksum None of these Codec Attenuation Coder-decoder ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class B network, how many subnets are available with a subnet mask of 248? 2 126 62 30 6 2 126 62 30 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose? Error detecting protocols Link access procedure (LAP) Communications software Telecommunications None of these Error detecting protocols Link access procedure (LAP) Communications software Telecommunications None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Number of bits per symbol used in Baudot code is 5 8 9 1 None of these 5 8 9 1 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main reason the OSI model was created? So Cisco could use the model. So different networks could communicate. So application developers can change only one layer's protocols at a time. To create a layered model larger than the DoD model. So Cisco could use the model. So different networks could communicate. So application developers can change only one layer's protocols at a time. To create a layered model larger than the DoD model. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? 14 15 30 16 14 15 30 16 ANSWER DOWNLOAD EXAMIANS APP