Computer Networking Which utility is useful for finding the local host name? None of these Netstat NBTSTAT Hostname PING None of these Netstat NBTSTAT Hostname PING ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed data processing configuration in which all activities must pass through a centrally located computer is called a: spider network ring network None of these data control network hierarchical network spider network ring network None of these data control network hierarchical network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? A physical address that is assigned by the manufacturer An alias for the computer name A logical address that identifies the workstation The logical domain address for the workstation A physical address that is randomly assigned each time the computer is started A physical address that is assigned by the manufacturer An alias for the computer name A logical address that identifies the workstation The logical domain address for the workstation A physical address that is randomly assigned each time the computer is started ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The _____ layer is the layer closest to the transmission medium. network None of these transport data link physical network None of these transport data link physical ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following does not allow multiple users or devices to share one communications line? doubleplexer multipplexer None of these concentrator controller doubleplexer multipplexer None of these concentrator controller ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? During high-traffic periods When upper-layer protocols require high reliability In an improperly implemented redundant topology After broken links are reestablished During high-traffic periods When upper-layer protocols require high reliability In an improperly implemented redundant topology After broken links are reestablished ANSWER DOWNLOAD EXAMIANS APP