Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What type of Ethernet operation allows only one entity to
transmit

at a time? For example, if someone else is transmitting,
they must wait.

A.) Full-Duplex

B.) Dual-Duplex

C.) Half-Duplex

D.) Latex

E.) Quarter-Duplex

F.) Suplex



What type of Ethernet operation allows only one entity to transmit at a time? For example, if so..

Answer / guest

Answer: C

Half-Duplex is like a one-lane bridge. If one car is going
over the

bridge, all other cars must wait on the other side before
crossing.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

what is ip address and what is the difference between the ip address and mac address why we are not using mac address instead of ip address

4 Answers   IBM,


What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN

0 Answers   Infosys,


How many reserve ports?

0 Answers  


"arpa" is used by the Cisco IOS for which encapsulation types? A. Ethernet_II B. Ethernet_802.3 C. Ethernet_802.2 D. Ethernet_SNAP

3 Answers   Cisco, Reliance,


What is the name of distance vector algorithm?

0 Answers  


Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25

1 Answers  


Identify the 2 commands to copy a configuration from a TFTP server to RAM? A.) configure network B.) configure overwrite C.) copy backup-config running-config D.) copy tftp running-config

2 Answers  


As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see "Set DF bit in IP header? [yes] :" What would happen if you answered no at the prompt. A. This lets the router fragment the packet. B. It tells the router not to fragment the packet. C. This lets the router direct the packet to the destination it finds in its routing table. D. It tell the router to send the packet to the next hop router.

1 Answers  


Suppose there are 3 pc's pc1 pc2 and pc3 all are connected with each other pc 1 is able to ping pc2 and pc3 but pc2 and pc 3 not able to ping pc 1 then what is an issue troubleshoot it?

0 Answers   Wipro,


which points are eliminated by the DBSCAN algorithm?

0 Answers  


What are the netbios and netbeui?

0 Answers  


Can you describe the Authentication Header (AH) Protocol?

0 Answers   CCIE,


Categories