Computer Networking Which of the following summation operations is performed on the bits to check an error-detecting code? Coder-decoder Checksum Attenuation Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions Codec Coder-decoder Checksum Attenuation Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions Codec ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful?1. TFTP server software must be running on the router.2. TFTP server software must be running on your laptop.3. The Ethernet cable connecting the laptop directly into the router's Ethernet port must be a straight-through cable.4. The laptop must be on the same subnet as the router's Ethernet interface.5. The copy flash tftp command must be supplied the IP address of the laptop. 3 and 5 only 5 only 1, 3 and 4 2, 4 and 5 3 and 5 only 5 only 1, 3 and 4 2, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking CSMA (Carrier Sense Multiple Access) is network access standard for connecting stations to a circuit-switched network None of these a very common bit-oriented data link protocol issued by ISO. a method access control technique for multiple-access transmission media. a method of determining which device has access to the transmission medium at any time network access standard for connecting stations to a circuit-switched network None of these a very common bit-oriented data link protocol issued by ISO. a method access control technique for multiple-access transmission media. a method of determining which device has access to the transmission medium at any time ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following communications modes support two-way traffic but in only one direction of a time? three-quarters duplex None of these full-of the above simplex half-duplex three-quarters duplex None of these full-of the above simplex half-duplex ANSWER DOWNLOAD EXAMIANS APP
Computer Networking MAC is a method of determining which device has access to the transmission medium at any time None of these network access standard for connecting stations to a circuit-switched network a method access control technique or multiple-access transmission media a very common bit-oriented data link protocol issued to ISO. a method of determining which device has access to the transmission medium at any time None of these network access standard for connecting stations to a circuit-switched network a method access control technique or multiple-access transmission media a very common bit-oriented data link protocol issued to ISO. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met?1. Each end of the trunk link must be set to the IEEE 802.1e encapsulation.2. The VTP management domain name of both switches must be set the same.3. All ports on both the switches must be set as access ports.4. One of the two switches must be configured as a VTP server.5. A rollover cable is required to connect the two switches together.6. A router must be used to forward VTP traffic between VLANs. 2 and 4 3, 5 and 6 1 and 6 1, 2 and 4 2 and 4 3, 5 and 6 1 and 6 1, 2 and 4 ANSWER DOWNLOAD EXAMIANS APP