In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device.
A)
reservation
B)
polling
C)
token passing
D)
none of the above

1 Answer

Answer :

polling

Related questions

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _____ method, time isdivided into intervals. In each interval, a reservation frameprecedes the dataframes sent in that interval. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned

Last Answer : handshaking

Description : The Token Ring implementation works on the __ mode. A. Contention B. Reservation C. Round Robin D. None

Last Answer : C. Round Robin

Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above

Last Answer : polling

Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : ______ is the most widelyused local area networkprotocol. A) Token Ring B) Token Bus C) Ethernet D) none of the above

Last Answer : Ethernet

Description : In Selective Repeat ARQ, if 5 is the number ofbits for the sequence number, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 16

Description : In Go-Back-N ARQ, if 5 is the number of bits for thesequencenumber, then the maximum size of the receive window mustbe _____ A) 15 B) 16 C) 31 D) 1

Last Answer : 1

Description : To guarantee the detectionof up to 5errors in all cases, the minimum Hamming distance in a block code mustbe _______. A) 5 B) 6 C) 11 D) none of the above

Last Answer : 6

Description : Based onthe Clos criteria, if N = 200, then k mustbe equal to or greater than____. A) 21 B) 19 C) 31 D) 41

Last Answer : 19

Description : Based onthe Clos criteria, if N = 200, then n mustbe equal to or greater than____. A) 10 B) 20 C) 30 D) 40

Last Answer : 10

Description : Transmission system for a multidrop network A. Taken passing B. Polling C. Switching D. CSMA/CD

Last Answer : B. Polling

Description : An invitation from the primary to a secondary to transmit a message. A. Retransmission B. Selection C. Reuse D. Polling

Last Answer : D. Polling

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

Last Answer : session layer

Description : The _____ houses the switches in token ring. A. transceiver B. nine-pin connector C. MAU D. NIC E. None of the above

Last Answer : MAU

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable

Last Answer : c. 20 metres of cable.

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer

Last Answer : a. session layer

Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring

Last Answer : c. Bus

Description : Terminators are used in which topology? a. Bus b. Star c. Ring d. token ring

Last Answer : a. Bus

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : Explain the frame format for token ring and token bus

Last Answer : Access method: Token passing _ Priority and reservation _ Time limits _ Monitor stations

Description : What is the advantage of FDDI over a basic Token Ring?

Last Answer : Fiber distributed Data Interface. A high speed token ring networking technology designed to run over optical fiber. FDDI is able to tolerate a single break in the cable or failure of one station due ... token before it is allowed to transmit. 802.5 and FDDI are examples of token ring networks.

Description : The modes of a MAC to share a transmission medium are ___. A. Round Robin B. Reservation C. Contention D. All the above

Last Answer : A. Round Robin

Description : The process of starting a or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called a. Duping b. Booting c. Padding d. CPS

Last Answer : Booting

Description : Which of the following is a secondary memory device? a. Keyboard b. Disk c. ALU d. All of the above

Last Answer : Disk

Description : A Bluetooth network consists of _____primary device(s)and up to____ secondary devices. A) one; five B) five; three C) two; six D) one; seven

Last Answer : one; seven

Description : When you save tothis, your data will remain intacteven when the computer is turned off– (A) RAM (B) Motherboard (C) Secondary storage device (D) Primary storage device (E) None of these

Last Answer : Secondary storage device

Description : In mesh topology, relationship between one device and another is .............. A) Primary to peer B) Peer to primary C) Primary to secondary D) Peer to Peer

Last Answer : D) Peer to Peer

Description : An STS multiplexer is a ______ device. A) one-layer B) two-layer C) three-layer D) four-layer

Last Answer : two-layer

Description : Recently ______ country Ends Reservation In Government Jobs: (a) Bangladesh (b) India (c) Malaysia (d) None of These

Last Answer : (a) Bangladesh

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : In IEEE 802.11, when a frame isgoingfrom one station in a BSS toanother without passing through thedistribution system, the address flag is _____ A) 00 B) 01 C) 10 D) 11

Last Answer : 00

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer

Last Answer : A. network layer

Description : When you save to this, your data will remain intact even when the computer is turned off: a) RAM b) Motherboard c) Secondary Storage Device d) Primary Storage Device e) None of The Above

Last Answer : c) Secondary Storage Device

Description : When you save to this, your data will remain intact even when the computer is turned off ..... 1) RAM 2) motherboard 3) secondary storage device 4) primary storage device

Last Answer : 3) secondary storage device

Description : Would you follow this polling by the NYT all the way to Nov. 6?

Last Answer : Nope – I want to do a Rip Van Winkle and fall asleep until November 7 and maybe permanently after that.

Description : How does TN have my home phone number in FL as part of their call list for polling?

Last Answer : You may have used it for something like a bank account or some other business in TN, and it cross referenced in a database.

Description : What question does the anti-assisted suicide side pose when polling the population?

Last Answer : Legitimate poll takers include the questions with the results.

Description : Where you live, when you go to your polling place, does someone "announce" it when you are about to actually vote? (see details)

Last Answer : No.I have never had them do that.I might like that if they introduced me as Keith Richards.XD

Description : What is it like to work at a polling site on election day?

Last Answer : It all depends on the country. Polling sites at tensely contested elections can be hazardous. Examples of this would be those in Afghanistan, Thailand, the Philippines. Military and/or police presence are a typical sight at these countries’ polling sites. In the US, polling sites are no big deal.