In _______ methods,a stationcannot send unless it hasbeen authorized byother stations.
A)
random access
B)
controlledaccess
C)
channelization
D)
none of the above

1 Answer

Answer :

controlledaccess

Related questions

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above

Last Answer : Channelization

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access

Description : There are two cliffs. They are each attached by a suspension bridge that takes 5 minutes to walk across, and is the only way to get to the other side. No one is allowed to cross the bridge unless ... the bridge, he'll wake up exactly when you reach the other side, and send you back)? -Riddles

Last Answer : You can't go as he is awake, he'll see you, but go when he doesn't see you. Then, turn back as he is waking up, pretending to go to the side you came from. Then, he'll figure you are unauthorized to set foot on the bridge, and send you to the side you want to get to.

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : The term 'duplex' refers to theability of the data receiving stations toecho back aconfirming messageto the sender. Infull duplex data transmission, both the sender and the receiver A. cannot talk at once B. can ... data one ata time D. can do one way data transmission only E. None of the above

Last Answer : can do one way data transmission only

Description : In IEEE 802.11, a___ is made of stationary or mobile wireless stations and anoptional central base station, known as the access point (AP). A) ESS B) BSS C) CSS D) none of the above

Last Answer : BSS

Description : In astar-topology Ethernet LAN, _______ is just a point where the signals coming from different stations collide; it is thecollision point. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : A passivehub

Description : _______ is designed to be usedin wirelessapplications in which stations must be ableto sharethe medium without interception by an eavesdropperand without beingsubject tojamming from a malicious intruder. A) Spread spectrum B) Multiplexing C) Modulation D) None of the above

Last Answer : Spread spectrum

Description : Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is _______. a. nP(1 – P)n – 1 b. nP c. P(1 – P)n – 1 d. n P (1 – P)n – 1

Last Answer : a. nP(1 – P)n – 1

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : Which of the following is designated as the international distress, safety and calling frequency for radio telephony for stations of the maritime mobile service when using frequencies in the authorized bands between 156 and 174 MHz? A. 165.8 MHz B. 156.8 MHz C. 158.6 MHz D. 168.5 MHz

Last Answer : B. 156.8 MHz

Description : We discussed ______ popular controlled-access methods. A) two B) three C) four D) none of the above

Last Answer : three

Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove

Last Answer : 7

Description : _______ control refers to aset of proceduresused torestrict the amount ofdata that the sender can send before waiting foracknowledgment. A) Flow B) Error C) Transmission D) none of the above

Last Answer : Flow

Description : The two basic types of record access methods are: A) Sequential and random B) Sequential and indexed C) Direct and immediate D) Online and real time

Last Answer : Answer : A

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : a. Sequential and random

Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five

Last Answer : three

Description : Storage device where time to retrieve stored information is independent of address where it is stored is called _______ A. Random Access Memory B. Secondary Memory C. System D. None of the above

Last Answer : A. Random Access Memory

Description : Channelization of streams is designed to reduce flooding by ___________. a) Speeding the passage of floodwaters b) Reducing bank erosion c) Slowing down river velocity so as to reduce damage d) Increase the meandering of streams

Last Answer : a) Speeding the passage of floodwaters

Description : Internal and external factors that affect message reception by the students in the classroom are referred to as (A) feedback (B) fragmentation (C) channelization (D) noise

Last Answer : Answer: D

Description : Transforming thoughts, ideas and messages into verbal and non-verbal signs is referred to as (A) channelization (B) mediation (C) encoding (D) decoding

Last Answer : (C) encoding

Description : I am a Medicare provider authorized to send claims by mail. What is the new address for N. CA claims. Thanks?

Last Answer : It looks like the address for submitting claims is: Palmetto GBA Jurisdiction 1, AG-420 PO Box 100145 Columbia SC 29202-3145

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.

Last Answer : A. Social Engineering.

Description : ____ is known as allowing the authorized access to information.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer : Decryption is known as allowing the authorized access to information. 

Description : In communication satellite, multiple repeaters are known as a. detector b. modulator c. stations d. transponders

Last Answer : transponders

Description : . In IEEE 802.11, communication between two stations in twodifferent BSSs usually occurs viatwo ________. A) BSSs B) ESSs C) APs D) none of the above

Last Answer : APs

Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : In_______, the stations share thebandwidth of the channel in time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : A ________is a device in which the stations are completely unaware of its existence. A) passive hub B) repeater C) simple bridge D) transparent bridge

Last Answer : transparent bridge

Description : ________ is actually a multiport repeater. It is normally usedto createconnections between stations in a physical star topology. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : An activehub

Description : Eight stations arecompeting for the use of a sharedchannelusing the'Adaptive tree Walk Protocol'. If the stations 7 and8 are suddenly become ready at once, how many bit slots areneeded toresolve the contention? A. 7 slots B. 5 slots C. 10 slots D. 14 slots

Last Answer : 7 slots

Description : Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : a continuous frequency capableof being modulated or impressed witha second signa

Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time

Description : A pure ALOHA Network transmits 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ______. a. 0.384 b. 0.184 c. 0.286 d. 0.58

Last Answer : b. 0.184

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : With Slotted Aloha, a …………. sends out small clock tick packets to the outlying stations. A. distributed clock B. synchronized clock C. centralized clock D. Digital clock

Last Answer : C. centralized clock

Description : No appeal against such alternative will lie to a higher authority unless it is submitted within the usual time limit of _______ from the date of communication a) Three months b) Six month c) One year d) One month

Last Answer : b) Six month

Description : The two kinds of main memory are: a. Primary and secondary b. Random and sequential c. ROM and RAM d. All of above

Last Answer : ROM and RAM

Description : Inthe _______method, after thestation finds the line idle it sends or refrainfrom sending based on the outcome ofa random number generator. If the line is busy, it tries again A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : p-persistent

Description : Inthe ________method, a stationthat has a frame tosend senses the line. If the line is idle, it sends immediately. If theline is not idle, it waits a random amount of time and then senses the line again. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : nonpersistent

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called _____ a. random error b. burst error c. inverted error d. double error

Last Answer : b. burst error

Description : When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ A. random error B. burst error C. inverted error D. double error

Last Answer : B. burst error