In ___________ methods, no station is superior to another station and none is assigned the controlover another.
A)
random access
B)
controlledaccess
C)
channelization
D)
none of the above

1 Answer

Answer :

random access

Related questions

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above

Last Answer : Channelization

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : Channelization of streams is designed to reduce flooding by ___________. a) Speeding the passage of floodwaters b) Reducing bank erosion c) Slowing down river velocity so as to reduce damage d) Increase the meandering of streams

Last Answer : a) Speeding the passage of floodwaters

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : The portion of physical layer that interfaces with the media access control sublayer is called ___________ a. physical signalling sublayer b. physical data sublayer c. physical address sublayer d. physical transport sublayer

Last Answer : a. physical signalling sublayer

Description : In IEEE 802.11, a___ is made of stationary or mobile wireless stations and anoptional central base station, known as the access point (AP). A) ESS B) BSS C) CSS D) none of the above

Last Answer : BSS

Description : We discussed ______ popular controlled-access methods. A) two B) three C) four D) none of the above

Last Answer : three

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : The two basic types of record access methods are: A) Sequential and random B) Sequential and indexed C) Direct and immediate D) Online and real time

Last Answer : Answer : A

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : a. Sequential and random

Description : What is meant by a dedicated computer? a. Which is used by one person only b. Which is assigned one and only one task c. Which uses one kind of software d. Which is meant for application software

Last Answer : Which is assigned one and only one task

Description : The master list of an indexed file A. is sortedin ascending order B. containsonly a list of keys and record numbers C. has a number assigned toeach record D. both (b)and (c) E. None of the above

Last Answer : has a number assigned toeach record

Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223

Last Answer : a. 158

Description : A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet? a. 14 b. 30 c. 62 d. 126

Last Answer : c. 62

Description : In process to process delivery, an application process is assigned a ………….., which is likely to be …………….each time that process is started A. process identifier number , different B. process identifier number, same C. source, mixed D. Source, similar

Last Answer : A. process identifier number , different

Description : To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses A. Table B. look up table C. name space D. name table

Last Answer : C. name space

Description : An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started. A. Similar B. smaller C. different D. larger

Last Answer : C. different

Description : Internal and external factors that affect message reception by the students in the classroom are referred to as (A) feedback (B) fragmentation (C) channelization (D) noise

Last Answer : Answer: D

Description : Transforming thoughts, ideas and messages into verbal and non-verbal signs is referred to as (A) channelization (B) mediation (C) encoding (D) decoding

Last Answer : (C) encoding

Description : Which of the following statement(s) concerning intravenous nutritional support is/are true? a. Concentrations of glucose no higher than 5% should be used to avoid peripheral vein sclerosis ... suitable site d. Venous thrombosis is an uncommon complication for long-term central vein catheterization

Last Answer : Answer: b Although peripheral access can be used for intravenous nutrition, the major disadvantage of this technique is limited caloric delivery to meet catabolic demands within tolerated fluid ... studies that use phlebography or radionucleotide venography indicate the incidence is as high as 35%

Description : What is another name for random-access memory (RAM)?

Last Answer : Read/write memory.

Description : If you have implemented a network where hosts are assigned specific roles such as for file sharing and printing. Other hosts access those resources but do not host services of their own. what type of?

Last Answer : What is the answer ?

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : What is required to ensure competitive advantages in specific markets? (A) Access to capital (B) Common office buildings (C) Superior knowledge (D) Common metals

Last Answer : (C) Superior knowledge

Description : The two kinds of main memory are: a. Primary and secondary b. Random and sequential c. ROM and RAM d. All of above

Last Answer : ROM and RAM

Description : Inthe _______method, after thestation finds the line idle it sends or refrainfrom sending based on the outcome ofa random number generator. If the line is busy, it tries again A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : p-persistent

Description : Inthe ________method, a stationthat has a frame tosend senses the line. If the line is idle, it sends immediately. If theline is not idle, it waits a random amount of time and then senses the line again. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : nonpersistent

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called _____ a. random error b. burst error c. inverted error d. double error

Last Answer : b. burst error

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ A. random error B. burst error C. inverted error D. double error

Last Answer : B. burst error

Description : Quadrature amplitude modulation(QAM) isa combination of ___________. A) ASK and FSK B) ASK and PSK C) PSK and FSK D) none of the above

Last Answer : ASK and PSK

Description : In IPv6,a ___________ address is anaddress of 96 bits of zero followed by32 bits of IPv4 address. A) link local B) site local C) mapped D) none of the above

Last Answer : none of the above

Description : In IPv6,options are inserted between the _________and the ___________ data. A) baseheader;extensionheader B) baseheader;upper-layer data C) base header; frame header D) noneof the abov

Last Answer : baseheader;upper-layer data

Description : Emulation of ________ through ___________ is notefficientand may create long delays. A) unicasting; multiple unicasting B) multicasting; multiple unicasting C) broadcasting; multicasting D) none of the above

Last Answer : multicasting; multiple unicasting

Description : For purposes of routing, the Internet isdivided into ___________. A) wide area networks B) autonomous networks C) autonomous systems D) none of the above

Last Answer : autonomous systems

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address

Last Answer : b. a short VC number