A token or small data packet is ______passed around the network:
a) Intimately
b) Continuously
c) Twicely
d) None of These

1 Answer

Answer :

b) Continuously

Related questions

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : To implement a ring network we use the ______technology: a) Stand Ring b) Flash Ring c) Token Ring d) None of These

Last Answer : c) Token Ring

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

Last Answer : session layer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer

Last Answer : a. session layer

Description : RNA is intimately associated with synthesis of which constituent of the cell. a. Carbohydrates b. Proteins c. Lipids d. Inorganics

Last Answer : Proteins

Description : ―Lencho, who knew his field intimately well.‖ ̳Intimately well‘ refers to _______. (a) The yield expected from the crops. (b) The damage that the land could incur. (c) The prediction that the rain would visit the place. (d) He knew the surrounding areas very well.

Last Answer : (c) The prediction that the rain would visit the place.

Description : In networks, a small message used to pass between one station to another is known as (1) Token (2) Byte (3) Word (4) Ring

Last Answer : Token

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and software B : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and software B : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and software B : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and software B : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and softwareB : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : The first type of firewall was the packet filter which looks at: a) network addresses b) Ports of the packet and determines if that packet should be allowed or blocked c) Both of above d) None of These

Last Answer : c) Both of above

Description : ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses: a) Circuit Level Gateway b) Proxy Server c) Packet Filter d) None of These

Last Answer : b) Proxy Server

Description : The fundamental approaches to build a point - to - point network is: a) Circuit Switching b) Packet Switching c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A packet filtering firewall operates at which of the following OSI layer? 1) At the Application layer 2) At the Transport Layer 3) At the Network Layer 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : A packet filtering firewall operates at which of the following OSI layer? 1 At the Application layer 2 At the Transport Layer 3 At the Network Layer 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect

Last Answer : c.ping

Description : Determine from the following the basic mode of transmission system in the public data network in which data are transferred from the source to the network and from the network to the destination in the frame format. A. Voice mode B. Asynchronous mode C. Synchronous mode D. Packet mode

Last Answer : D. Packet mode

Description : Network layer at source is responsible for creating a packet from data coming from another ________ a) Station b) Link c) Node d) Protocol

Last Answer : d) Protocol

Description : What medium is used by IBM token ring network that operates at either 4 Mbps or 16 Mbps? A. Twisted pair B. Coaxial cable C. Fiber-optic D. Parallel-wire line

Last Answer : A. Twisted pair

Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable

Last Answer : c. 20 metres of cable.

Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring

Last Answer : c. Bus

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs. (1) 1 (2) 2 (3) 3 (4) 4

Last Answer : (2) 2 

Description : What is network topology? List network standards. Explain token ring standard with the help of diagram.

Last Answer : Network topology: A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal ... empty" frame, ready to be taken by a workstation when it has a message to send.

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : What is a token?

Last Answer : A C program consists of various tokens and a token is either a keyword, an identifier, a constant, a string literal, or a symbol.

Description : .is a high performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR

Last Answer : A) FDDI

Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : Circuit which gives continuously varying potential is called a. complex network b. wheat stone bridge c. potential divider d. all of above

Last Answer : c. potential divider

Description : Which of the following IS NOT one of the advantages associated with a robotics implementation program? a) Low costs for hardware and software b) Robots work continuously around the clock c) Quality of manufactured goods can be improved d) Reduced company cost for worker fringe benefits

Last Answer : a) Low costs for hardware and software

Description : What three things does a network packet contain?

Last Answer : What is the answer ?

Description : It is a protocol used to connect the other packet witching network A. X.25 B. X.50 C. X.10 D. X.75

Last Answer : D. X.75

Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above

Last Answer : circuit-switched

Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above

Last Answer : destination

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : In _______delivery, both thedeliverer of the IP packet and the destination are on the same network. A) aconnectionless B) a direct C) an indirect D) none of the above

Last Answer : a direct

Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above

Last Answer : Down through thelayers of the IP architecture and then up thelayers again

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network