Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as None of these Amplitude Amplitude-shift keying Amplitude modulation Aloha None of these Amplitude Amplitude-shift keying Amplitude modulation Aloha ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient The network becomes more efficient An additional token is added for every 1,000 nodes After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient The network becomes more efficient ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which of the following technologies is the term HFC used? DSL PPPoE Frame Relay Dedicated T1 DSL PPPoE Frame Relay Dedicated T1 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.172.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the subnetwork address for a host with the IP address 200.10.5.68/28? 200.10.5.56 200.10.5.64 200.10.5.32 200.10.5.0 200.10.5.56 200.10.5.64 200.10.5.32 200.10.5.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is considered to be the address before translation? Outside global Outside local Inside global Inside local Outside global Outside local Inside global Inside local ANSWER DOWNLOAD EXAMIANS APP