Computer Networking Which of the following is required to communicate between two computers? communications hardware All of these access to transmission medium protocol communications software communications hardware All of these access to transmission medium protocol communications software ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? one bit or any odd number of bits inverted in a block of data during transmission one bit or any odd number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission two bits or any even number of bits inverted in a byte during transmission None of these one bit or any odd number of bits inverted in a block of data during transmission one bit or any odd number of bits inverted in a byte during transmission two bits or any even number of bits inverted in a block during transmission two bits or any even number of bits inverted in a byte during transmission None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration? None of these Ping the address of the local host Ping a distant router. Ping the Microsoft Web site Ping the broadcast address None of these Ping the address of the local host Ping a distant router. Ping the Microsoft Web site Ping the broadcast address ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the two main types of access control lists (ACLs)?1. Standard2. IEEE3. Extended4. Specialized 2 and 4 1 and 2 3 and 4 1 and 3 2 and 4 1 and 2 3 and 4 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following medium access control technique is used for bus/tree? token ring MAC None of these CSMA token bus token ring MAC None of these CSMA token bus ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 3 and 4 1 only 1 and 2 2 only 3 and 4 1 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP