We have categorizedaccess methods into _______ groups.
A)
two
B)
three
C)
four
D)
five

1 Answer

Answer :

three

Related questions

Description : Traditionally, _____ methods of switching have been important. A) four B) three C) five D) six

Last Answer : three

Description : We candivide today's networks into ____ broad categories. A) four B) three C) five D) two

Last Answer : three

Description : We cansay thata packet switchhas _______ typesof components. A) two B) three C) four D) none of the above

Last Answer : four

Description : The AALis divided into _______ sublayers. A) two B) three C) four D) none of the above

Last Answer : two

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : f four hosts on anetworkbelong tothesame group, a totalof _______ sent inresponse to a general query message. A) one membership report is B) two membership reports are C) three membership reports are D) noneof the above

Last Answer : two membership reports are

Description : The ATM standard defines______ layers. A) two B) three C) four D) five

Last Answer : three

Description : SONET defines _______ layers. A) two B) three C) four D) five

Last Answer : four

Description : Which number system is commonly used as a shortcut notation for groups of four binary digits? a. Binary b. Decimal c. Octal d. Hexadecimal

Last Answer : Hexadecimal

Description : Human Body The human blood is divided into _____. A. Five groups B. Three groups C. Four groups D. Two groups

Last Answer : ANSWER: C

Description : The human blood is divided into _____. A. Five groups B. Three groups C. Four groups D. Two groups

Last Answer : ANSWER: C

Description : The human blood is divided into _____. A. Five groups B. Three groups C. Four groups D. Two groups

Last Answer : ANSWER: C

Description : The human blood is divided into----- groups? A. Two groups B. Three groups C. Four groups (Answer) D. Five groups

Last Answer : C. Four groups (Answer)

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : A restaurant offers special prices for groups dining together. For a buffet dinner, the restaurant charges $10.00 for one person, $20.00 for two people, $29.00 for three people, $37.00 for four people, $44.00 for five people. How much does for 8 cost?

Last Answer : 59

Description : The IEEE 802.11 wireless LANs use ________ types of frames. A) four B) five C) six D) none of the above

Last Answer : none of the above

Description : . In IEEE 802.11, the addressing mechanism can include upto ______addresses. A) four B) five C) six D) none of the above

Last Answer : none of the above

Description : In IEEE 802.11, the MAC layer framehas ______ fields. A) four B) five C) six D) none of the above

Last Answer : four

Description : We discussed ______ popular controlled-access methods. A) two B) three C) four D) none of the above

Last Answer : three

Description : A syllogism consists of _______ terms. A) five B) two C) three D) four. 

Last Answer : C) three 

Description : BCSBI is governed by a _______ governing Council including one Chairman. A. six-member B. Four-member C. Five-member D. Three-member E. None of the Above

Last Answer : A. six-member Explanation: The board is governed by a six-member governing Council including one Chairman.

Description : In _______ switching, the paths in thecircuit are separatedfrom one another spatially. A) time-division B) space-division C) two-dimensional D) three-dimensiona

Last Answer : space-division

Description : In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. A. CSMA/CA B. CSMA/CD C. either (a) or (b) D. both (a) and (b)

Last Answer : A. CSMA/CA

Description : A Bluetooth network consists of _____primary device(s)and up to____ secondary devices. A) one; five B) five; three C) two; six D) one; seven

Last Answer : one; seven

Description : In block coding, if k =2 and n =3, we have _______ invalid codewords. A) 8 B) 4 C) 2 D) none of the above

Last Answer : 2

Description : ____ are special-interest groups that quickly test, evaluate, andstandardize new technologies. A) Forums B) Regulatory agencies C) Standards organizations D) All of theabove

Last Answer : Forums

Description : In hexadecimal colon notation, a 128-bit address isdivided into _______ sections, each _____hexadecimal digits in length. A) 8: 2 B) 8: 3 C) 8: 4 D) none of the above

Last Answer : 8: 4

Description : The _______ layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format. a. network b. presentation c. transport d. data link

Last Answer : b. presentation

Description : The _______ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames A. Data Link B. Physical C. Network D. Session

Last Answer : A. Data Link

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access

Description : There arethree sampling methods: __________. A) quantized, sampled, and ideal B) ideal, sampled, andflat-top C) ideal, natural, and flat-top D) none of the above

Last Answer : ideal, natural, and flat-top

Description : Which of the following encoding methods does not provide for synchronization? A) NRZ-L B) RZ C) NRZ-I D) Manchester

Last Answer : NRZ-L

Description : IEEE 802.1d specification, defines _________criteria for a transparent bridges. A) two B) three C) four D) none of the above

Last Answer : three

Description : A regenerator is a________ device. A) one-layer B) two-layer C) three-layer D) four-layer

Last Answer : four-layer

Description : An add/drop multiplexer isa ______device. A) one-layer B) two-layer C) three-layer D) four-layer

Last Answer : three-layer

Description : An STS multiplexer is a ______ device. A) one-layer B) two-layer C) three-layer D) four-layer

Last Answer : two-layer

Description : The term modem is a composite word that refers to the two functional entities that make up the device: asignal _______ and a signal _______. A) modulator; demodulator B) demodulator; modulator C) modern;demo D) none of the above

Last Answer : modulator; demodulator

Description : When a beam of light travels through media of two different densities, if theangle of incidence isgreater than the critical angle, _______ occurs. A) reflection B) refraction C) incidence D) criticism

Last Answer : reflection

Description : The sharing of a medium and its link by two or more devices is called _______. A) modulation B) encoding C) line discipline D) multiplexing

Last Answer : multiplexing

Description : An area is _______. A) part of an AS B) composed of at least two ASs C) another term foran AS D) none of the above

Last Answer : part of an AS

Description : . In _______ routing, the least cost routebetween any two nodes is theroute with the minimum distance. A) path vector B) distancevector C) link state D) none of the above

Last Answer : distancevector

Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove

Last Answer : all of theabove

Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above

Last Answer : wirelessLAN

Description : In IEEE 802.11, when a frame is coming from an AP and going to astation, the address flag is _______. A) 00 B) 01 C) 10 D) 11

Last Answer : 01

Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PCF

Description : IEEE hasdefined the specifications fora wireless LAN, called _______, whichcovers the physical and data link layers. A) IEEE 802.3 B) IEEE 802.5 C) IEEE 802.11 D) IEEE 802.2

Last Answer : IEEE 802.11

Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing