Computer Networking Modem is used in data transmission. When was it invented and in which country? 1965, Germany 1950, USA 1950, Japan 1963, USA None of these 1965, Germany 1950, USA 1950, Japan 1963, USA None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The CCITT Recommendation X.25 specifies three layers of communications: datalink, network and transport application, presentation and session None of these Session, transport and network physical datalink and network datalink, network and transport application, presentation and session None of these Session, transport and network physical datalink and network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following network types have a designated router and a backup designated router assigned? 1. Broadcast 2. Point-to-point 3. NBMA 4. NBMA point-to-point 3 and 4 All of these 1, 2 and 3 1 and 3 3 and 4 All of these 1, 2 and 3 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of bounded medium? None of these All of these Wave guide Coaxial cable None of these All of these Wave guide Coaxial cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking HDLC (High-level Data Link Control) is None of these network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time a method access control technique for multiple-access transmission media a very common bit-oriented data link protocol issued by ISO. None of these network access standard for connecting stations to a circuit-switched network a method of determining which device has access to the transmission medium at any time a method access control technique for multiple-access transmission media a very common bit-oriented data link protocol issued by ISO. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 1 and 4 3, 4 and 5 1 and 3 2 and 3 1 and 4 3, 4 and 5 1 and 3 2 and 3 ANSWER DOWNLOAD EXAMIANS APP