Computer Networking What is the maximum distance with maximum data rate for 802.11b? About 150 feet Over 200 feet About 90-100 feet About 65-75 feet About 150 feet Over 200 feet About 90-100 feet About 65-75 feet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes less efficient ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A protocol is a set of rules governing a time sequence of events that must take place between modems between peers None of these across an interface between an interface between modems between peers None of these across an interface between an interface ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character H is sent and the character I is received, what type of error is this? single-bit multiple-bit burst recoverable single-bit multiple-bit burst recoverable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many non-overlapping channels are available with 802.11h? 23 40 12 3 23 40 12 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to create a backup configuration? copy running-config startup-config copy running backup wr mem config mem copy running-config startup-config copy running backup wr mem config mem ANSWER DOWNLOAD EXAMIANS APP