Computer Networking Error detection at the data link level is achieved by Cyclic Redundancy Code Hamming Code Equalization Bit Stuffing Cyclic Redundancy Code Hamming Code Equalization Bit Stuffing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 3 and 4 1 and 3 2 and 5 2, 3 and 5 3 and 4 1 and 3 2 and 5 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? UDP None of these SMTP X.25 VMTP UDP None of these SMTP X.25 VMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Typewriter terminals can print computer-generated data at a rate of 120 characters per second 120 characters per minute None of these 1200 characters per minute 10 characters per second 120 characters per second 120 characters per minute None of these 1200 characters per minute 10 characters per second ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The topology with highest reliability is: Ring topology Mesh topology Star topology Bus topology Ring topology Mesh topology Star topology Bus topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use? 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.0 255.255.255.252 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.0 255.255.255.252 ANSWER DOWNLOAD EXAMIANS APP