Computer Networking Which protocol is used to send a destination network unknown message back to originating hosts? BootP TCP ICMP ARP BootP TCP ICMP ARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: data control network ring network None of these spider network hierarchical network data control network ring network None of these spider network hierarchical network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets? 255.255.255.192 255.255.255.252 255.255.255.248 255.255.255.224 255.255.255.240 255.255.255.192 255.255.255.252 255.255.255.248 255.255.255.224 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Bandlimited signal is None of these simultaneous transmission of data to a number of stations a signal all of whose energy is contained within a finite frequency range transmission of signals without modulation All of these None of these simultaneous transmission of data to a number of stations a signal all of whose energy is contained within a finite frequency range transmission of signals without modulation All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11a standard? 5Gbps 5GHz 2.4Gbps 2.4GHz 5Gbps 5GHz 2.4Gbps 2.4GHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A software that allows a personal computer to pretend it as a terminal is auto-dialing None of these bulletin board modem terminal emulation auto-dialing None of these bulletin board modem terminal emulation ANSWER DOWNLOAD EXAMIANS APP