Computer Networking What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation? 0x2102 0x2101 0x2142 0x2100 0x2102 0x2101 0x2142 0x2100 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 6 protocols Layer 5 protocols Layer 4 protocols None of these Layer 7 protocols Layer 6 protocols Layer 5 protocols Layer 4 protocols None of these Layer 7 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The method of communication in which transmission takes place in both directions, but only one direction at a time is called Full Duplex Simplex Half Duplex Four wire circuit Full Duplex Simplex Half Duplex Four wire circuit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Avalanche photodiode receivers can detect hits of transmitted data by receiving 100 photons 400 photons None of these 200 photons 300 photons 100 photons 400 photons None of these 200 photons 300 photons ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one? 225.255.254.0 255.255.252.0 255.255.255.252 255.255.255.240 225.255.254.0 255.255.252.0 255.255.255.252 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following types of connections can use full duplex?1. Hub to hub2. Switch to switch3. Host to host4. Switch to hub5. Switch to host 1, 2 and 4 2, 3 and 5 3 and 5 3 and 4 1, 2 and 4 2, 3 and 5 3 and 5 3 and 4 ANSWER DOWNLOAD EXAMIANS APP