Computer Networking With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? 192 224 240 252 248 192 224 240 252 248 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of a client-server model? None of these TELNET FTP DNS All of these None of these TELNET FTP DNS All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When UPC is used, the price of the item is located on the item and on the shelf None of these in computer storage on the shelf and in computer storage on the item on the item and on the shelf None of these in computer storage on the shelf and in computer storage on the item ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases. Repeaters cannot increase the signal strength sufficiently Cable terminators do not absorb the signal properly Cable terminators do not reflect the signal properly Network collisions occur "Line echo" occurs due to the impedance of the cable Repeaters cannot increase the signal strength sufficiently Cable terminators do not absorb the signal properly Cable terminators do not reflect the signal properly Network collisions occur "Line echo" occurs due to the impedance of the cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select the wrong data communication system component: Medium Receiver Transits Protocol Medium Receiver Transits Protocol ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 3 and 4 1 only 1 and 2 2 only 3 and 4 1 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP