Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above
Last Answer : token passing
Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above
Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above
Last Answer : polling
Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above
Last Answer : token passing: token
Description : In the _____ method, time isdivided into intervals. In each interval, a reservation frameprecedes the dataframes sent in that interval. A) reservation B) polling C) token passing D) none of the above
Last Answer : reservation
Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above
Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned
Last Answer : handshaking
Description : The Token Ring implementation works on the __ mode. A. Contention B. Reservation C. Round Robin D. None
Last Answer : C. Round Robin
Description : In a _______ connection, more thantwo devices can share asingle link. A) point-to-point B) multipoint C) primary D) secondary
Last Answer : multipoint
Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above
Last Answer : session layer
Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer
Last Answer : a. session layer
Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above
Description : The sharing of a medium and its link by two or more devices is called _______. A) modulation B) encoding C) line discipline D) multiplexing
Last Answer : multiplexing
Description : The _______ layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format. a. network b. presentation c. transport d. data link
Last Answer : b. presentation
Description : Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply. A. A switch remembers which devices are connected on each interface, while a hub does not. B. A hub is a ... versions of switches. a. A,B b. A,B,C c. A,B,C,D d. A,C,D
Last Answer : b. A,B,C
Description : Transmission system for a multidrop network A. Taken passing B. Polling C. Switching D. CSMA/CD
Last Answer : B. Polling
Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer
Last Answer : a. network layer
Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer
Last Answer : A. network layer
Description : The process of starting a or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called a. Duping b. Booting c. Padding d. CPS
Last Answer : Booting
Description : Would you follow this polling by the NYT all the way to Nov. 6?
Last Answer : Nope – I want to do a Rip Van Winkle and fall asleep until November 7 and maybe permanently after that.
Description : A _______is the optical link connecting two neighbor devices. A) section B) line C) path D) none of the above
Last Answer : line
Description : In a ________ connection, three or more devices share a link. A) multipoint B) point-to-point C) (a) and(b) D) none of the above
Description : The functions of a Logical Link Layer (LLC) are a. Error control b. Flow control c. Creating and managing the communication link between two devices with the help of the Transport layer. d. All the above
Last Answer : d. All the above
Description : The functions of a Logical Link Layer (LLC) are ___. A. Error control B. Flow control C. Creating and managing the communication link between two devices with the help of the Transport layer. D. All the above
Last Answer : D. All the above
Description : Three or more devices share a link in ________ connection. a) Unipoint b) Multipoint c) Point to point d) Simplex
Last Answer : b) Multipoint
Description : ______ is the most widelyused local area networkprotocol. A) Token Ring B) Token Bus C) Ethernet D) none of the above
Last Answer : Ethernet
Description : The _____ houses the switches in token ring. A. transceiver B. nine-pin connector C. MAU D. NIC E. None of the above
Last Answer : MAU
Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer
Last Answer : C) Session Layer
Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable
Last Answer : c. 20 metres of cable.
Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring
Last Answer : c. Bus
Description : Terminators are used in which topology? a. Bus b. Star c. Ring d. token ring
Last Answer : a. Bus
Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : D. 1. true, 2. true, 3. false
Description : Explain the frame format for token ring and token bus
Last Answer : Access method: Token passing _ Priority and reservation _ Time limits _ Monitor stations
Description : What is the advantage of FDDI over a basic Token Ring?
Last Answer : Fiber distributed Data Interface. A high speed token ring networking technology designed to run over optical fiber. FDDI is able to tolerate a single break in the cable or failure of one station due ... token before it is allowed to transmit. 802.5 and FDDI are examples of token ring networks.
Description : The modes of a MAC to share a transmission medium are ___. A. Round Robin B. Reservation C. Contention D. All the above
Last Answer : A. Round Robin
Description : Which of the following is used to hold running program instructions? a) Primary Storage b) Virtual Storage c) Internal Storage d) Minor Devices
Last Answer : Answer: a Explanation: The primary storage is responsible for holding the data, intermediate results and the results of ongoing processes or jobs. Virtual storage is the main memory storage required for saving large amount of data for future reference. The other options are invalid
Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above
Last Answer : wirelessLAN
Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove
Last Answer : all of theabove
Description : An invitation from the primary to a secondary to transmit a message. A. Retransmission B. Selection C. Reuse D. Polling
Last Answer : D. Polling
Description : A communications device that combines transmissions from several I/O devices into one line is a a. concentrator b. modifier c. multiplexer d. full-duplex line
Last Answer : multiplexer
Description : A Bluetooth network consists of _____primary device(s)and up to____ secondary devices. A) one; five B) five; three C) two; six D) one; seven
Last Answer : one; seven
Description : Devices interconnected by the LAN should include A. Computers and terminals B. mass storage device, printers and plotters C. bridges and gateways D. All of theabove E. None of the above
Last Answer : All of theabove
Description : In a topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring
Last Answer : A) Mesh
Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file
Last Answer : C) Multiplexer
Description : Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address ? a. Hub b. Modem c. Switch d. Gateway
Last Answer : c. Switch
Description : IEEE hasdefined the specifications fora wireless LAN, called _______, whichcovers the physical and data link layers. A) IEEE 802.3 B) IEEE 802.5 C) IEEE 802.11 D) IEEE 802.2
Last Answer : IEEE 802.11
Description : The _______ layer of Ethernet consistsof the LLC sublayer and the MAC sublayer. A) data link B) physical C) network D) none of the above
Last Answer : data link
Description : A _______ is a connecting devicethat operates in the physical and data link layers of theInternet model. A) repeater B) bridge C) router D) none of the above
Last Answer : bridge
Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove
Last Answer : physical