Computer Networking Which of the following allows a router to respond to an ARP request that is intended for a remote host? Inverse ARP (IARP) Gateway DP Proxy ARP Reverse ARP (RARP) Inverse ARP (IARP) Gateway DP Proxy ARP Reverse ARP (RARP) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called? Electronic newspaper Electronic mail Paperless office Global network None of these Electronic newspaper Electronic mail Paperless office Global network None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What frequency range is used for TV transmission and low power microwave applications? Very Low Frequency : 3 kHz to 30 kHz Medium Frequency : 300 kHz to 3 MHz Ultra High Frequency : 300 MHz to 3000 MHz None of these Super High Frequency : 3000 MHz to 30000 MHz Very Low Frequency : 3 kHz to 30 kHz Medium Frequency : 300 kHz to 3 MHz Ultra High Frequency : 300 MHz to 3000 MHz None of these Super High Frequency : 3000 MHz to 30000 MHz ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.248 255.255.255.255 255.255.255.240 255.255.255.192 255.255.255.224 255.255.255.248 255.255.255.255 255.255.255.240 255.255.255.192 255.255.255.224 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following program is used to copy files to or from another UNIX timesharing system over a single link? TFTP UART None of these UUCP VMTP TFTP UART None of these UUCP VMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP