We discussed ______ popular controlled-access methods.
A)
two
B)
three
C)
four
D)
none of the above

1 Answer

Answer :

three

Related questions

Description : SONET defines _______ layers. A) two B) three C) four D) five

Last Answer : four

Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five

Last Answer : two

Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above

Last Answer : polling

Description : Data structure suitable for the application is discussed in ? data design architectural design procedural design interface design

Last Answer : data design

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : Magnetic disks are the most popular medium for a. Direct access b. Sequential access c. Both of above d. None of above

Last Answer : Both of above

Description : The most popular commercial DBMS. A) Microsoft SQL Server B) Microsoft Access C) MySQL D) Oracle

Last Answer : Oracle

Description : We have categorizedaccess methods into _______ groups. A) two B) three C) four D) five

Last Answer : three

Description : In modulo-2 arithmetic, we use only ______. A) 1and 2 B) 0and 2 C) 0and 1 D) none of the above

Last Answer : 0and 1

Description : In modulo-11 arithmetic, we use only the integers inthe range ______, inclusive. A) 1to 10 B) 1to 11 C) 0to 10 D) none of the above

Last Answer : 0to 10

Description : Touse a cable network for data transmission, we needtwo keydevices:a ______ and a _________ A) CM; CMS B) CT; CMTS C) CM; CMTS D) none of the above

Last Answer : CM; CMS

Description : For a ______ channel, we need to use the Shannon capacity tofind the maximum bit rate. A) noisy B) noiseless C) bandpass D) low-pass

Last Answer : noisy

Description : The following is an example of what kind of paragraph You are now familiar with the health benefits of hobbies. You have taken an in-depth look at the specific benefits of reading as a hobby. We have discussed the adventurous nature of reading, in that..?

Last Answer : Concluding

Description : Traditionally, _____ methods of switching have been important. A) four B) three C) five D) six

Last Answer : three

Description : There arethree sampling methods: __________. A) quantized, sampled, and ideal B) ideal, sampled, andflat-top C) ideal, natural, and flat-top D) none of the above

Last Answer : ideal, natural, and flat-top

Description : Which of the following encoding methods does not provide for synchronization? A) NRZ-L B) RZ C) NRZ-I D) Manchester

Last Answer : NRZ-L

Description : Which model is popular for students small projects ? Waterfall Model Spiral Model Quick and Fix model Prototyping Mode

Last Answer : Waterfall Model

Description : Which most popular input device is used today for interactive processing and for the one line entry of data for batch processing? a. Mouse b. Magnetic disk c. Visual display terminal d. Card punch

Last Answer : Mouse

Description : Which was the most popular first generation computer? a. IBM 1650 b. IBM 360 c. IBM 1130 d. IBM 2700

Last Answer : IBM 1650

Description : In the third generation of computers: a. Distributed data processing first became popular b. An operating system was first developed c. High-level prcedu7ral languages were firs used d. On-line, real time systems first became popular

Last Answer : On-line, real time systems first became popular

Description : Most popular modems availableare based onthe ________standards. A) V-series B) X-series C) VX-series D) none of the above

Last Answer : V-series

Description : The most popular technology in time-division switching is called the _________. A) STI B) ITS C) TSI D) none of the above

Last Answer : TSI

Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium

Last Answer : all of above including access to transmission medium

Description : Which of the following is required to communicatebetween two computers? A. communications software B. protocol C. communicationshardware D. access to transmission medium E. All of theabov

Last Answer : All of theabov

Description : The two sublayers of a Data Link layer are a. LLC Logical Link Control Layer b. MAC Medium Access Control Layer c. Both A and B d. Data Layer

Last Answer : c. Both A and B

Description : What is MAC ? A computer made by Apple Memory address corruption Mediocre Apple Computer Media Access Control

Last Answer : Media Access Control

Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.

Last Answer : Aux Port

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : The disk drive component used to position read/write heads over a specific track I known as a. Acoustic couples b. Access arm c. Cluster d. All of the above

Last Answer : Access arm

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : Address register

Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction

Last Answer : Memory protection

Description : Which of the following memories has the shortest access times? a. Cache memory b. Magnetic bubble memory c. Magnetic core memory d. RAM

Last Answer : Cache memory

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify? a. Track number b. Sector number c. Surface number d. All of above

Last Answer : Track number

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : It provides only sequential access to stored data

Description : Offline device is a. A device which is not connected to CPU b. A device which is connected to CPU c. A direct access storage device d. An I/O device

Last Answer : A device which is not connected to CPU

Description : Access time is a. seek time + latency time b. seek time c. seek time – latency time d. latency time

Last Answer : seek time + latency time

Description : The x.25 standard specifies a a. technique for start-stop data b. technique for dial access c. DTE/DCE interface d. data bit rate e. none of above

Last Answer : DTE/DCE interface

Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above

Last Answer : TDD-TDMA

Description : In IEEE 802.11, the access method used in the DCF sublayer is _________. A) ALOHA B) CSMA/CA C) CSMA/CD D) none of the above

Last Answer : CSMA/CA

Description : In IEEE 802.11, a___ is made of stationary or mobile wireless stations and anoptional central base station, known as the access point (AP). A) ESS B) BSS C) CSS D) none of the above

Last Answer : BSS

Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above

Last Answer : Channelization

Description : The _____sublayer is responsible for the operation of the CSMA/CD access method and framing. A) LLC B) MII C) MAC D) none of the above

Last Answer : MAC

Description : The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet. A) 1-persistent B) p-persistent C) non-persistent D) none of the above

Last Answer : 1-persistent

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above

Last Answer : All of theabove