Computer Networking
Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine?

X.25
None of these
UDP
VMTP
SMTP

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following summation operations is performed on the bits to check an error-detecting code?

Attenuation
Coder-decoder
Checksum
Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions
Codec

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Token-Ring, because it uses a MAU
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
Ethernet, because it is cabled using fiber-optic cable
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What is the purpose of Spanning Tree Protocol in a switched LAN?

To create collision domains
To manage the VLAN database across multiple switches
To prevent routing loops in networks with redundant paths
To prevent switching loops in networks with redundant switched paths
To provide a mechanism for network monitoring in switched environments

ANSWER DOWNLOAD EXAMIANS APP