Which of the following is not a basic architecture for dedicated circuit networks?
a. ring
b. partial mesh
c. bus
d. star
e. full mesh
Answer:...
Which of the following type of networks permit packets from separate messages to be interleaved?
Which of the following type of networks permit packets from separate messages to be interleaved?
a. circuit switched network
b. dedicated circuit...
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits.
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits.
a. full...
A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits.
A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a...
Which of the following is not a benefit of packet switched services?
Which of the following is not a benefit of packet switched services?
a. The data transmission rates tend to be lower than dial-up or dedicated...
Which of the following is not a problem with dialed circuits?
Which of the following is not a problem with dialed circuits?
a. Data transmission rates on dialed circuits are relatively low.
b. Dialed circuits...
When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:
When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:
a. dedicated...
Which of the following is not an advantage of a WLAN?
Which of the following is not an advantage of a WLAN?
a. The ability to use the network in places where it is impractical to install a wired network.
b....
At the top of the Internet structure are national ___________, such as AT&T and Sprint.
At the top of the Internet structure are national ___________, such as AT&T and Sprint.
a. Network Access Points
b. Internet service providers
c....
Which of the following is a primary advantage of a VPN?
Which of the following is a primary advantage of a VPN?
a. low cost
b. inflexibility
c. unpredictable traffic congestion
d. security
e. complexity...
Which of the following is not a basic architecture for dedicated circuit networks?
Which of the following is not a basic architecture for dedicated circuit networks?
a. ring
b. partial mesh
c. bus
d. star
e. full mesh
Answer:...
In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network.
In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets...
_______ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs.
_______ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs.
a....
ARQ means that:
ARQ means that:
a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without...
Which of the following is not a property of a WAN:
Which of the following is not a property of a WAN:
a. connects backbone networks and MANS.
b. spans hundreds or thousands of miles
c. provides data...
A metropolitan area network is:
A metropolitan area network is:
a. a high speed central network, built with privately owned media, which connects other networks in a distance spanning...
Devices in a rack are connected together using ___________.
Devices in a rack are connected together using ___________.
a.) patch cables
b.) string
c.) servers
d.) modules
e.) chassis switches
Answer:...
With a switched backbone network, the equipment is usually placed in a ______.
With a switched backbone network, the equipment is usually placed in a ______.
a.) server
b.) NIC
c.) cabinet
d.) basement
e.) rack
Answer:...
Which of the following is true regarding switched backbones?
Which of the following is true regarding switched backbones?
a. They place all network devices for one part of the building physically in the same...
Which of the following can connect two different networks that utilize the same or different data link and network layer protocols as well as the same or different cable type?
Which of the following can connect two different networks that utilize the same or different data link and network layer protocols as well as the same...
Which of the following devices is the most complex?
Which of the following devices is the most complex?
a. Gateway
b. Router
c. Layer 3 switches
d. Switch
e. Multiprotocol router
Answer:...
Gateways:
Gateways:
a. process all messages, even if the messages are not explicitly addressed to them
b. can translate one network protocol into another
c....
Which of the following is not a way that a router differs from a switch?
Which of the following is not a way that a router differs from a switch?
a. routers can connect two or more networks that use the same data...
Routers:
Routers:
a. operate at the application layer
b. operate only at the physical layer
c. cannot connect two or more networks that use the same...
Which of the following is not true about switched backbones?
Which of the following is not true about switched backbones?
a. performance is improved over traditional (bridged or routed) backbone networks
b....
Which of the following is not a type of hardware device that can be used to interconnect networks?
Which of the following is not a type of hardware device that can be used to interconnect networks?
a. switches
b. routers
c. multiprotocol routers
d....
Which of the following type of media is most commonly used in backbone networks because of its high capacity?
Which of the following type of media is most commonly used in backbone networks because of its high capacity?
a. fiber
b. infrared frequencies
c....
A backbone network is:
A backbone network is:
a. a high speed central network that connects other networks in a distance spanning up to several miles.
b. a group of microcomputers...
A star topology is:
A star topology is:
a. difficult to manage because the central computer receives and routes all messages in the network
b. dependent upon the...
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.
a. multipoint
b....
A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.
A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.
a....
A(n) _____________ is required to connect a computer to WLAN.
A(n) _____________ is required to connect a computer to WLAN.
a. Ethernet NIC
b. antennae
c. wireless NIC
d. access point
e. hub
Answer:...
Which of the following is not an advantage of a WLAN?
Which of the following is not an advantage of a WLAN?
a. The ability to use the network in places where it is impractical to install a wired network.
b....
Which of the following is not a way to reduce network demand?
Which of the following is not a way to reduce network demand?
a. shifting network usage from high cost times to lower cost times
b. using data...
Network demand will not be reduced by:
Network demand will not be reduced by:
a. restricting (or moving) applications such as desktop videoconferencing
b. using network devices to ensure...
Which of the following is not an effective way to reduce LAN network demand:
Which of the following is not an effective way to reduce LAN network demand:
a. move files to client computers
b. use disk caching on the client...
Which of the following can provide fault tolerance for the storage space on a server?
Which of the following can provide fault tolerance for the storage space on a server?
a. RAID
b. SCSI
c. IDE
d. USB
e. EIDE
Answer:...
Which of the following is not true about switched Ethernet?
Which of the following is not true about switched Ethernet?
a. The switch has a physical bus topology.
b. It uses a switch instead of a hub.
c....
Switched Ethernet:
Switched Ethernet:
a. uses a hub to connect computers
b. has a physical topology of a ring
c. has a logical topology of a ring
d. has a logical...
Switched Ethernet:
Switched Ethernet:
a. always has a lower capacity than shared Ethernet.
b. operates at 50% of capacity before performance becomes a problem.
c. operates...
CSMA/CA is an acronym for:
CSMA/CA is an acronym for:
a. Carrier Sense Multiple Access with Collision Acknowledgment
b. Carrier Sense Mode Access with Carrier Avoidance
c....
Which of the following is not a controlled access method of media access control?
Which of the following is not a controlled access method of media access control?
a. Token passing
b. CSMA/CD
c. polling
d. roll call polling
e....
Which of the following is not true about CSMA/CD?
Which of the following is not true about CSMA/CD?
a. The acronym refers to Carrier Sense Multiple Access with Collision Detection
b. It is used...
A logical bus topology:
A logical bus topology:
a. is always used by token ring protocol LANs
b. has all computers connected to each other in point-to-point connections
c....
The type of logical topology that Ethernet uses is a:
The type of logical topology that Ethernet uses is a:
a. ring
b. bus
c. star
d. mesh
e. interconnected
Answer:...
_________ is how the network works conceptually.
_________ is how the network works conceptually.
a. Physical topology
b. Logical topology
c. Network topology
d. Ethernet
e. Media access control
Answer:...
Ethernet LAN was developed by:
Ethernet LAN was developed by:
a. IBM
b. ARPANET
c. DEC, Xerox, and Intel
d. University of Minnesota
e. CERN laboratory in Geneva
Answer:...
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
a. it is not very popular
b. it is a bit-oriented protocol
c....
_____ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
_____ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
a....
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access...
The server version of the Network Operating System does not:
The server version of the Network Operating System does not:
a. provide the software that performs the functions associated with the physical...
_______ is the software that controls the network.
_______ is the software that controls the network.
a. Network Operating System
b. Client Operating System
c. Embedded Operating System
d. Network...
Which of the following is not a critical software component in a dedicated server LAN?
Which of the following is not a critical software component in a dedicated server LAN?
a. application software on server computers
b. network...
A(n) _____________ is required to connect a computer to WLAN.
A(n) _____________ is required to connect a computer to WLAN.
a. Ethernet NIC
b. antennae
c. wireless NIC
d. access point
e. hub
Answer:...
Which of the following is not a basic LAN component?
Which of the following is not a basic LAN component?
a. client
b. PAD
c. server
d. network interface card
e. network operating system
Answer:...
A peer-to-peer LAN:
A peer-to-peer LAN:
a. has more capability than a dedicated server
b. supports a higher number of computers than a dedicated server
c. is generally...
Networks that are designed to connect similar computers that share data and software with each other are called:
Networks that are designed to connect similar computers that share data and software with each other are called:
a. client/server networks
b. peer-to-peer...
________ refers to one computer legally sharing a software package, such as Microsoft Word, with other computers on the network to save costs.
________ refers to one computer legally sharing a software package, such as Microsoft Word, with other computers on the network to save costs.
a....
_______ refers to having users access the same data files, exchange information via electronic mail, or search the Internet for information.
_______ refers to having users access the same data files, exchange information via electronic mail, or search the Internet for information.
a. Resource...
One drawback to dynamic routing is:
One drawback to dynamic routing is:
a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by...
_____ is a type of dynamic routing.
_____ is a type of dynamic routing.
a. Static routing
b. Circuitous routing
c. Centralized routing
d. Link state
e. X.25 routing
Answer:...
______ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.
______ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are...
An advantage of centralized routing is:
An advantage of centralized routing is:
a. routing does reflect changing network conditions, such as computers that are overloaded by many...
The three fundamental approaches to routing are:
The three fundamental approaches to routing are:
a. circuitous, flat, and direct routing
b. connectionless, static, and connection-oriented
c....
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists...
_______ is the process of determining the path that a message will travel from sending computer to receiving computer.
_______ is the process of determining the path that a message will travel from sending computer to receiving computer.
a. Routing
b. Addressing
c....
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.
a. broadcast...
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing...
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:
a. unicast message
b....
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.
a....
Dynamic addressing:
Dynamic addressing:
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated...
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
a....
A(n) ________ refers to a group of computers that are logically grouped together by IP number.
A(n) ________ refers to a group of computers that are logically grouped together by IP number.
a. IPv6 group
b. subnet
c. data link group
d....
______ is a specially formatted request used to perform IP address to data link address resolution.
______ is a specially formatted request used to perform IP address to data link address resolution.
a. Address Resolution Protocol
b. Domain...
Server name resolution is done using the:
Server name resolution is done using the:
a. Address Resolution Protocol
b. Border Gateway Protocol
c. Internet Control Message Protocol
d. Routing...
_______ is the translation of application layer addresses into IP addresses.
_______ is the translation of application layer addresses into IP addresses.
a. Network interface card reversal
b. IPv6
c. Server name resolution
d....
A client computer is assigned a data link layer address is by:
A client computer is assigned a data link layer address is by:
a. hardware manufacturers
b. software manufacturers
c. middleware manufacturers
d....
With QoS routing different __________ are defined, each with different priorities.
With QoS routing different __________ are defined, each with different priorities.
a. classes of service
b. domain names
c. application layer...
With __________ ARQ, the sender immediately sends the next message or packet of data.
With __________ ARQ, the sender immediately sends the next message or packet of data.
a. continuous
b. immediate
c. open window
d. stop-and-wait
e....
A _________ is a connection-oriented approach to sending packets on a packet switched service.
A _________ is a connection-oriented approach to sending packets on a packet switched service.
a. permanent virtual circuit
b. datagram
c. histogram
d....
The three fundamental approaches to routing are:
The three fundamental approaches to routing are:
a. circuitous, flat, and direct routing
b. connectionless, static, and connection-oriented
c....
____ routing is most commonly used when the application data or message can fit into one single packet.
____ routing is most commonly used when the application data or message can fit into one single packet.
a. Frame-oriented
b. Connection-oriented
c....
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
a. transport
b. network
c....
_______ routing is a method of routing in which each packet makes its own way through the network.
_______ routing is a method of routing in which each packet makes its own way through the network.
a. Frequency division
b. Connection-oriented
c....
A virtual circuit is established in the ___________ routing method.
A virtual circuit is established in the ___________ routing method.
a. asynchronous
b. connection-oriented
c. frequency division
d. application...
The older version of IP has a ________ header of control information.
The older version of IP has a ________ header of control information.
a. 128-bit
b. 192-bit
c. 1024-bit
d. 160-bit
e. 320-bit
Answer:...
The newer form of IP, version 6 (Ipv6) is:
The newer form of IP, version 6 (Ipv6) is:
a. running out of address space to support the growth of the Internet
b. has a 20 byte header
c....
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
a. IP addresses
b. sequence numbers
c....
The source destination port identifier tells the destination station _____________.
The source destination port identifier tells the destination station _____________.
a. which computer sent the TCP packet.
b. which application layer...
A typical TCP packet has a _______ header of control information.
A typical TCP packet has a _______ header of control information.
a. 32-bit
b. 64-bit
c. 160-bit
d. 192-bit
e. 32-byte
Answer:...
TCP/IP:
TCP/IP:
a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet
b. performs packetizing, as well...
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done...
IP:
IP:
a. performs packetizing functions
b. does not have a header
c. is currently in use with only one packet form or structure
d. performs routing...
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
a. ARPANET
b. IBM
c. Hewlett-Packard
d. University of Minnesota
e....
______ is the dominant network protocol today.
______ is the dominant network protocol today.
a. SDLC
b. SNA
c. IPX/SPX
d. TCP/IP
e. X.25
Answer:...
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
a. physical
b. transport
c....
As part of the five-layer network model used in this textbook, the data link layer sits directly between:
As part of the five-layer network model used in this textbook, the data link layer sits directly between:
a. the physical and the application...
The network layer of the Internet model uses the _____________ protocol to route messages though the network.
The network layer of the Internet model uses the _____________ protocol to route messages though the network.
a. TCP
b. HTTP
c. FTP
d. SMTP
e. IP
Answer:...
The _________ layer is responsible for routing of messages from the sender to the final destination.
The _________ layer is responsible for routing of messages from the sender to the final destination.
a. data communication layer
b. resident layer
c....
Breaking a network into smaller parts is called network:
Breaking a network into smaller parts is called network:
a. fragmentation
b. segmentation
c. localization
d. allocation
e. mitigation
Answer:...
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
a. transport
b. network
c....
A virtual circuit is established in the ___________ routing method.
A virtual circuit is established in the ___________ routing method.
a. asynchronous
b. connection-oriented
c. frequency division
d. application...
What size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.
What size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.
a. network layer address resolution
b....
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
a. bits
b. bytes
c....
_______ is not an important function of the transport layer.
_______ is not an important function of the transport layer.
a. end-to-end delivery of the message
b. taking messages from the application...
Which of the following is a function of the transport layer?
Which of the following is a function of the transport layer?
a. linking the physical layer to the network layer
b. formatting messages by indicating...
Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?
Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process...
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?
a....
Ethernet LAN was developed by:
Ethernet LAN was developed by:
a. IBM
b. ARPANET
c. DEC, Xerox, and Intel
d. University of Minnesota
e. CERN laboratory in Geneva
Answer:...
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
a. it is not very popular
b. it is a bit-oriented protocol
c....
Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?
Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?
a. IP
b. TCP
c. Ethernet
d. HTTP
e. FTP
Answer:...
A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection.
A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection.
a. ACK
b. NAK
c. SYN
d. ARQ
e....
Synchronous transmission:
Synchronous transmission:
a. cannot be used on multipoint circuits
b. is used to send one character at a time
c. uses start bits before each...
Asynchronous transmission:
Asynchronous transmission:
a. is used to transmit each character simultaneously with all other characters
b. has a pre-determined, fixed time...
With __________ ARQ, the sender immediately sends the next message or packet of data.
With __________ ARQ, the sender immediately sends the next message or packet of data.
a. continuous
b. immediate
c. open window
d. stop-and-wait
e....
With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data.
With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data.
a. open window
b. halt and...
______ controls errors by detecting and correcting them at the receiving end without retransmission of the original message.
______ controls errors by detecting and correcting them at the receiving end without retransmission of the original message.
a. Hamming code
b....
ARQ means that:
ARQ means that:
a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without...
Using parity, the probability for detecting an error, given that one has occurred, is:
Using parity, the probability for detecting an error, given that one has occurred, is:
a. about 50% for either even or odd parity
b. about 70%...
The probability of detecting an error, given that one has occurred, using parity checking is about:
The probability of detecting an error, given that one has occurred, using parity checking is about:
a. 100%
b. 0%
c. 50%
d. 75%
e. 98%
Answer:...
With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?
With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following...
On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
a. amplifiers
b. repeaters
c. multiplexers
d. digitizers
e....
Which of the following is way to reduce or eliminate crosstalk on a circuit,
Which of the following is way to reduce or eliminate crosstalk on a circuit,
a. changing multiplexing techniques
b. adding repeaters or amplifiers...
______ is an effective way to prevent attenuation.
______ is an effective way to prevent attenuation.
a. Shielding wires
b. Adding fluorescent lights
c. Adding repeaters or amplifiers to a circuit
d....
_______ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.
_______ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.
a. Shielding wires
b. Adding fluorescent lights
c....
A phase hit is likely to be:
A phase hit is likely to be:
a. spikes
b. a short term shift out of phase
c. intermodulation noise
d. white noise
e. Gaussian noise
Answer:...
When the output signal from an amplifier on a circuit is different from the input signal, this is called _________________.
When the output signal from an amplifier on a circuit is different from the input signal, this is called _________________.
a. intermodulation noise
b....
If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of:
If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of:
a....
The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is:
The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is:
a. jitter
b. spiking
c. attenuation
d....
When a signal is reflected back to the transmitting equipment, it is called a(n) _________.
When a signal is reflected back to the transmitting equipment, it is called a(n) _________.
a. jitter
b. echo
c. crosstalk
d. attenuation
e. impulse...
Cross-talk:
Cross-talk:
a. occurs when one circuit picks up signals in another
b. is always bothersome because it has a high signal strength
c. decreases...
_______can obliterate a group of bits, causing a burst error.
_______can obliterate a group of bits, causing a burst error.
a. Crosstalk
b. Attenuation
c. Impulse noise
d. Intermodulation noise
e. Jitter
Answer:...
The primary source of error in data communications is:
The primary source of error in data communications is:
a. echoes
b. intermodulation noise
c. spikes
d. jitter
e. cross-talk
Answer:...
The familiar background static on radios and telephones is called:
The familiar background static on radios and telephones is called:
a. echoes
b. intermodulation noise
c. line outages
d. cross-talk
e. white...
Another term for impulse noise is:
Another term for impulse noise is:
a. Gaussian noise
b. spikes
c. attenuation
d. cross-talk
e. intermodulation noise
Answer:...
Errors on a network can occur:
Errors on a network can occur:
a. only on dial-up type of circuits
b. because of noise on the line
c. only on poorly maintained networks
d....
With contention:
With contention:
a. computers wait until the circuit is free before they send data
b. the server or front end processor works consecutively...
Which of the following is not true about CSMA/CD?
Which of the following is not true about CSMA/CD?
a. The acronym refers to Carrier Sense Multiple Access with Collision Detection
b. It is used...
Which of the following is true about roll call polling?
Which of the following is true about roll call polling?
a. It can not be modified to increase priority of clients or terminals.
b. It does...
Subscribe to:
Posts (Atom)