Computer Networking Which of the following digits are known as the sub-address digits (for use by the user) of the Network User Address (NUA)? None of these 01-Apr 13-14 05-Jul 08-Dec None of these 01-Apr 13-14 05-Jul 08-Dec ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 6 protocols Layer 4 protocols Layer 5 protocols None of these Layer 7 protocols Layer 6 protocols Layer 4 protocols Layer 5 protocols None of these Layer 7 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To connect a computer with a device in the same room, you might be likely to use a dedicated line a ground station None of these All of these a coaxial cable a dedicated line a ground station None of these All of these a coaxial cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which one of the following network uses dynamic or adaptive routing? None of these ARPANET SNA(IBM's System Network Architechture) TYMNET None of these ARPANET SNA(IBM's System Network Architechture) TYMNET ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are None of these to assign address to private network DTEs A and B both adequate cost control mechanisms for administration of the private networks universal accessibility for private network Data Terminal Equipment (DTE) None of these to assign address to private network DTEs A and B both adequate cost control mechanisms for administration of the private networks universal accessibility for private network Data Terminal Equipment (DTE) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device An additional token is added for every 1,000 nodes The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device ANSWER DOWNLOAD EXAMIANS APP