Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.192 255.255.255.255 255.255.255.224 255.255.255.248 255.255.255.240 255.255.255.192 255.255.255.255 255.255.255.224 255.255.255.248 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A batch processing terminal would not include a CPU card reader card punch None of these line printer CPU card reader card punch None of these line printer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers? 8 9 4 16 None of these 8 9 4 16 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In OSI network architecture, the dialogue control and token management are responsibilities of network layer data link layer transport layer session layer None of these network layer data link layer transport layer session layer None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Amplitude modulation Amplitude None of these Amplitude-shift keying Aloha Amplitude modulation Amplitude None of these Amplitude-shift keying Aloha ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Three Four Two Six Five Three Four Two Six Five ANSWER DOWNLOAD EXAMIANS APP