Computer Networking Transmission of computerised data from one location to another is called data transfer data communication data flow None of these data management data transfer data communication data flow None of these data management ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 only 1 and 2 2 only 3 and 4 1 only 1 and 2 2 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In communication satellite, multiple repeaters are known as modulator detector None of these stations transponders modulator detector None of these stations transponders ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host? 32 - bits 48 - bits 64 - bits None of these 16 - bits 32 - bits 48 - bits 64 - bits None of these 16 - bits ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? RPC SNMP FTP SMTP None of these RPC SNMP FTP SMTP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame? Discard it and send an error message back to the originating host Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port Flood the network with the frame Discard it and send an error message back to the originating host Add the destination to the MAC address table and then forward the frame Add the source address and port to the MAC address table and forward the frame out the destination port Flood the network with the frame ANSWER DOWNLOAD EXAMIANS APP