Computer Networking The topology with highest reliability is: Ring topology Star topology Mesh topology Bus topology Ring topology Star topology Mesh topology Bus topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 3 and 4 1 and 2 1 only 4 only 3 and 4 1 and 2 1 only 4 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU Ethernet, because it is cabled using fiber-optic cable Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU Ethernet, because it is cabled using fiber-optic cable Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and crossover cable PC asynchronous port None of these synchronous port crossover cable PC asynchronous port None of these synchronous port ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The OCR reading unit attached to a POS terminal is called a wand cursor None of these All of these light pen wand cursor None of these All of these light pen ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data communications system depends on four fundamental characteristics Receiver Timeliness Sender Medium Receiver Timeliness Sender Medium ANSWER DOWNLOAD EXAMIANS APP