In _______ methods, the stations consult one another tofind which station has the right to send.
A)
random access
B)
controlledaccess
C)
channelization
D)
none of the above

1 Answer

Answer :

controlledaccess

Related questions

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access

Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above

Last Answer : Channelization

Description : In IEEE 802.11, a___ is made of stationary or mobile wireless stations and anoptional central base station, known as the access point (AP). A) ESS B) BSS C) CSS D) none of the above

Last Answer : BSS

Description : Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is _______. a. nP(1 – P)n – 1 b. nP c. P(1 – P)n – 1 d. n P (1 – P)n – 1

Last Answer : a. nP(1 – P)n – 1

Description : For a ______ channel, we need to use the Shannon capacity tofind the maximum bit rate. A) noisy B) noiseless C) bandpass D) low-pass

Last Answer : noisy

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : The term 'duplex' refers to theability of the data receiving stations toecho back aconfirming messageto the sender. Infull duplex data transmission, both the sender and the receiver A. cannot talk at once B. can ... data one ata time D. can do one way data transmission only E. None of the above

Last Answer : can do one way data transmission only

Description : In astar-topology Ethernet LAN, _______ is just a point where the signals coming from different stations collide; it is thecollision point. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : A passivehub

Description : _______ is designed to be usedin wirelessapplications in which stations must be ableto sharethe medium without interception by an eavesdropperand without beingsubject tojamming from a malicious intruder. A) Spread spectrum B) Multiplexing C) Modulation D) None of the above

Last Answer : Spread spectrum

Description : Which of the following methods of theodolite traversing is suitable for locating the details which are far away from transit stations? (A) Measuring angle and distance from one transit station (B) ... at one station and distance from other (D) Measuring distance from two points on traverse line

Last Answer : (B) Measuring angles to the point from at least two stations

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : In_____, each station is allocateda time slotduring which it can send data. Each stationtransmits its data in itsassigned time slot. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In______, each station is allocated a band to send its data. In other words, each band is reservedfor a specific station,and it belongs to the station all the time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : FDMA

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : When does the station B send a positive acknowledgement (ACK) to station A in Stop and Wait protocol? a. only when no error occurs at the transmission level b. when retransmission of old packet in a novel frame is necessary c. only when station B receives frame with errors d. all of the above

Last Answer : only when no error occurs at the transmission level

Description : . If there is only one station with a packet to send, this guarantees that there will ………….. For that packet. A. never be a collision B. be a collision C. be an improvement D. direction

Last Answer : A. never be a collision

Description : Why do you take x-rays at different horizontal angulations A. To find more canals B. Tofind more foramina

Last Answer : A. To find more canals

Description : We discussed ______ popular controlled-access methods. A) two B) three C) four D) none of the above

Last Answer : three

Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above

Last Answer : 48-b

Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove

Last Answer : 7

Description : _______ control refers to aset of proceduresused torestrict the amount ofdata that the sender can send before waiting foracknowledgment. A) Flow B) Error C) Transmission D) none of the above

Last Answer : Flow

Description : The two basic types of record access methods are: A) Sequential and random B) Sequential and indexed C) Direct and immediate D) Online and real time

Last Answer : Answer : A

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : a. Sequential and random

Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five

Last Answer : three

Description : Storage device where time to retrieve stored information is independent of address where it is stored is called _______ A. Random Access Memory B. Secondary Memory C. System D. None of the above

Last Answer : A. Random Access Memory

Description : Channelization of streams is designed to reduce flooding by ___________. a) Speeding the passage of floodwaters b) Reducing bank erosion c) Slowing down river velocity so as to reduce damage d) Increase the meandering of streams

Last Answer : a) Speeding the passage of floodwaters

Description : Internal and external factors that affect message reception by the students in the classroom are referred to as (A) feedback (B) fragmentation (C) channelization (D) noise

Last Answer : Answer: D

Description : Transforming thoughts, ideas and messages into verbal and non-verbal signs is referred to as (A) channelization (B) mediation (C) encoding (D) decoding

Last Answer : (C) encoding

Description : In_________ transmission, we send bits oneafter another without startor stop bits or gaps. It is the responsibilityof the receiver togroup the bits. A) synchronous B) asynchronous C) isochronous D) none of the abov

Last Answer : synchronous

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : What is another name for random-access memory (RAM)?

Last Answer : Read/write memory.

Description : Another name for the cable TV office is the _______. A) splitter B) fiber node C) combiner D) head end

Last Answer : head end

Description : In _______ switching, the paths in thecircuit are separatedfrom one another spatially. A) time-division B) space-division C) two-dimensional D) three-dimensiona

Last Answer : space-division

Description : In an optical fiber, the inner coreis _______ the cladding. A) denser than B) less dense than C) the samedensityas D) another name for

Last Answer : denser than

Description : The _______ technique uses M different carrier frequencies that are modulated by the source signal. At one moment, the sign modulates one carrier frequency; at the next moment, thesignal modulates another carrier frequency. A) FDM B) DSSS C) FHSS D) TDM

Last Answer : FHSS

Description : An area is _______. A) part of an AS B) composed of at least two ASs C) another term foran AS D) none of the above

Last Answer : part of an AS

Description : In communication satellite, multiple repeaters are known as a. detector b. modulator c. stations d. transponders

Last Answer : transponders

Description : . In IEEE 802.11, communication between two stations in twodifferent BSSs usually occurs viatwo ________. A) BSSs B) ESSs C) APs D) none of the above

Last Answer : APs

Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : In_______, the stations share thebandwidth of the channel in time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : A ________is a device in which the stations are completely unaware of its existence. A) passive hub B) repeater C) simple bridge D) transparent bridge

Last Answer : transparent bridge

Description : ________ is actually a multiport repeater. It is normally usedto createconnections between stations in a physical star topology. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : An activehub

Description : Eight stations arecompeting for the use of a sharedchannelusing the'Adaptive tree Walk Protocol'. If the stations 7 and8 are suddenly become ready at once, how many bit slots areneeded toresolve the contention? A. 7 slots B. 5 slots C. 10 slots D. 14 slots

Last Answer : 7 slots

Description : Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : a continuous frequency capableof being modulated or impressed witha second signa

Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time

Description : A pure ALOHA Network transmits 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ______. a. 0.384 b. 0.184 c. 0.286 d. 0.58

Last Answer : b. 0.184