Computer Networking Error detection at the data link level is achieved by Bit Stuffing Cyclic Redundancy Code Equalization Hamming Code Bit Stuffing Cyclic Redundancy Code Equalization Hamming Code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only 2 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called? None of these Telemailing Teletalking Telemeeting Teleconferencing None of these Telemailing Teletalking Telemeeting Teleconferencing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Two Three Five Four Six Two Three Five Four Six ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Correct method for full duplex mode of communication is: Both stations can transmit and receive data at the None of these One device sends and other device receives and vic One device can send other device can only accepts. Both stations can transmit and receive data at the None of these One device sends and other device receives and vic One device can send other device can only accepts. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called? Electronic mail None of these Telex Word processor Facsimile Electronic mail None of these Telex Word processor Facsimile ANSWER DOWNLOAD EXAMIANS APP