subject

Answer the following questions: Question 4
in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.

Group of answer choices
Transforming
Framing
Separating
Messaging

Question 5
Functions of data link control includes
Group of answer choices
framing
flow and error control
addressing
All of above

Question 6
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5?
Group of answer choices
User mode
Enable mode
Global configuration mode
VLAN mode
Interface configuration mode

Question 7
It is how the receiver detects the start and end of a frame.
Group of answer choices
Error control
Flow control
Framing
None of the above

Question 8
Which of the following describes a way to disable IEEE standard autonegotiation on a 0/00 port on a Cisco switch?
Group of answer choices
Configure the negotiate disable interface subcommand
Configure the no negotiate interface subcommand
Configure the speed 00 interface subcommand
Configure the duplex half interface subcommand
Configure the duplex full interface subcommand
Configure the speed 00 and duplex full interface subcommands

Question 9
substitutes eight consecutive zeros with 000VB0VB.
Group of answer choices
B4B8
HDB3
B8ZS
none of the above

Question 0
In transmission, we send bits one after another without start or stop bits or gaps. It is the responsibility of the receiver to group the bits.
Group of answer choices
synchronous
asynchronous
isochronous
none of the above

Question
In transmission, bits are transmitted over a single wire, one at a time.
Group of answer choices
asynchronous serial
synchronous serial
parallel
(a) and (b)

Question 2
Digital data refers to information that is
Group of answer choices
Continuous
Discrete
Bits
Bytes

Question 3
Two common scrambling techniques are .
Group of answer choices
NRZ and RZ
AMI and NRZ
B8ZS and HDB3
Manchester and differential Manchester

Question 4
is the process of converting digital data to a digital signal.
Group of answer choices
Block coding
Line coding
Scrambling
None of the above

Question 5
A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
Group of answer choices
It drops the frame. .
It floods the frame out of all active ports, except the origination port.
It sends out an ARP request looking for the MAC address.
It returns the frame to the sender

Question 6
The layer changes bits into electromagnetic signals.
Group of answer choices
Physical
Data link
Transport
None of the above

Question 7
Serial transmission occurs in
Group of answer choices
way
2 ways
3 ways
4 ways

Question 8
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Group of answer choices
RAM
ROM
Flash
NVRAM

Question 9
In what modes can you type the command show mac address-table and expect to get a response with MAC table entries? (Select Two)
Group of answer choices
User mode
Enable mode
Global configuration mode
Interface configuration mode

Question 20
Which of the following are true when comparing TCP/IP to the OSI Reference Model? (Select Two)
Group of answer choices
The TCP/IP model has seven layers while the OSI model has only four layers.
The TCP/IP model has four or five layers while the OSI model has seven layers.
The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model.
he TCP/IP Application layer is virtually identical to the OSI Application layer.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 01:40
Writing a modular program in visual c++. i am new to this and not sure what i am missing. i am getting the following error: baddate.cpp: in function ‘int main()’: baddate.cpp: 50: 3: error: ‘else’ without a previous ‘if’elsehere are the instructions and code: writing a modular program in c++in this lab, you add the input and output statements to a partially completed c++ program. when completed, the user should be able to enter a year, a month, and a day. the program then determines if the date is valid. valid years are those that are greater than 0, valid months include the values 1 through 12, and valid days include the values 1 through 31.notice that variables have been declared for you.write the simulated housekeeping() function that contains the prompts and input statements to retrieve a year, a month, and a day from the user.include the output statements in the simulated endofjob() function. the format of the output is as follows: month/day/year is a valid date.ormonth/day/year is an invalid date.execute the program entering the following date: month = 5, day = 32, year = 2014. record the output of this program.execute the program entering the following date: month = 9, day = 21, year = 2002. record the output of this /* program name: baddate.cppfunction: this program determines if a date entered by the user is valid.input: interactiveoutput: valid date is printed or user is alerted that an invalid date was entered*/#include bool validatedate(int, int, int); using namespace std; int main(){// declare variablesint year; int month; int day; const int min_year = 0, min_month = 1, max_month = 12, min_day = 1, max_day = 31; bool validdate = true; // this is the work of the housekeeping() method// get the year, then the month, then the daycout< < "enter the year"< > year; cout< < "enter the month"< > month; cout< < "enter the day"< > day; // this is the work of the detailloop() method// check to be sure date is validif(year < = min_year) // invalid yearvaliddate = false; else if (month < min_month || month > max_month) // invalid monthvaliddate = false; else if (day < min_day || day > max_day) // invalid dayvaliddate = false; // this is the work of the endofjob() method// test to see if date is valid and output date and whether it is valid or notif(validdate == true); {// output statementcout<
Answers: 1
question
Computers and Technology, 23.06.2019 14:30
Select the correct answer. andy received a potentially infected email that was advertising products. andy is at risk of which type of security threat? a. spoofing b. sniffing c. spamming d. phishing e. typo-squatting
Answers: 2
question
Computers and Technology, 24.06.2019 08:30
Formatting rows and columns is similar to cell formatting. in an openoffice calc spreadsheet, you can format data entered into rows and columns with the of the rows and columns options. you can insert rows and columns into, or delete rows and columns from, a spreadsheet. use the insert or delete rows and columns option on the insert tab. alternatively, select the row or column where you want new rows or columns to appear, right-click, and select insert only row or only column options. you can hide or show rows and columns in a spreadsheet. use the hide or show option on the format tab. for example, to hide a row, first select the row, then choose the insert tab, then select the row option, and then select hide. alternatively, you can select the row or columns, right-click, and select the hide or show option. you can adjust the height of rows and width of columns. select row and then select the height option on the format tab. similarly, select column, then select the width option on the format tab. alternatively, you can hold the mouse on the row and column divider, and drag the double arrow to the position. you can also use the autofit option on the table tab to resize rows and columns.
Answers: 1
question
Computers and Technology, 24.06.2019 16:00
To fill (copy) a cell across or down, point to the of the cell and drag. top left corner top right corner bottom left corner bottom right corner
Answers: 3
You know the right answer?
Answer the following questions: Question 4
in the data link layer separates a message from...
Questions
question
Mathematics, 25.10.2019 00:43
Questions on the website: 13722367