Computer Networking
Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as

None of these
Amplitude
Amplitude-shift keying
Amplitude modulation
Aloha

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer

An additional token is added for every 1,000 nodes
After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500
The network becomes less efficient
The network becomes more efficient

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?

access-list 10 deny 172.16.192.0 0.0.31.255
access-list 10 deny 172.16.0.0 0.0.255.255
access-list 10 deny 172.16.188.0 0.0.15.255
access-list 10 deny 172.16.172.0 0.0.31.255

ANSWER DOWNLOAD EXAMIANS APP