Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above
Last Answer : token passing
Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above
Last Answer : polling
Description : In the _____ method, time isdivided into intervals. In each interval, a reservation frameprecedes the dataframes sent in that interval. A) reservation B) polling C) token passing D) none of the above
Last Answer : reservation
Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above
Last Answer : token passing: token
Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above
Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above
Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned
Last Answer : handshaking
Description : The Token Ring implementation works on the __ mode. A. Contention B. Reservation C. Round Robin D. None
Last Answer : C. Round Robin
Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above
Description : Transmission system for a multidrop network A. Taken passing B. Polling C. Switching D. CSMA/CD
Last Answer : B. Polling
Description : In IEEE 802.11, when a frame isgoingfrom one station in a BSS toanother without passing through thedistribution system, the address flag is _____ A) 00 B) 01 C) 10 D) 11
Last Answer : 00
Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above
Last Answer : 48-b
Description : Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is _______. a. nP(1 – P)n – 1 b. nP c. P(1 – P)n – 1 d. n P (1 – P)n – 1
Last Answer : a. nP(1 – P)n – 1
Description : When people of different races line up to vote at a polling station they are exercising their righto to?
Last Answer : Feel Free to Answer
Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above
Last Answer : session layer
Description : ______ is the most widelyused local area networkprotocol. A) Token Ring B) Token Bus C) Ethernet D) none of the above
Last Answer : Ethernet
Description : The _____ houses the switches in token ring. A. transceiver B. nine-pin connector C. MAU D. NIC E. None of the above
Last Answer : MAU
Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer
Last Answer : C) Session Layer
Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable
Last Answer : c. 20 metres of cable.
Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer
Last Answer : a. session layer
Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring
Last Answer : c. Bus
Description : Terminators are used in which topology? a. Bus b. Star c. Ring d. token ring
Last Answer : a. Bus
Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : D. 1. true, 2. true, 3. false
Description : Explain the frame format for token ring and token bus
Last Answer : Access method: Token passing _ Priority and reservation _ Time limits _ Monitor stations
Description : What is the advantage of FDDI over a basic Token Ring?
Last Answer : Fiber distributed Data Interface. A high speed token ring networking technology designed to run over optical fiber. FDDI is able to tolerate a single break in the cable or failure of one station due ... token before it is allowed to transmit. 802.5 and FDDI are examples of token ring networks.
Description : The modes of a MAC to share a transmission medium are ___. A. Round Robin B. Reservation C. Contention D. All the above
Last Answer : A. Round Robin
Description : An officer transferred may not, without urgent necessity or special orders of the Head of the circle, leave the station a) Before the arrival of the permanent successor b) After the arrival of the permanent successor c) After completed his tenure d) None of these
Last Answer : a) Before the arrival of the permanent successor
Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : controlledaccess
Description : In networks, a small message used to pass between one station to another is known as (1) Token (2) Byte (3) Word (4) Ring
Last Answer : Token
Description : Define a reservation station?
Last Answer : Define a reservation station?
Description : Inthe _________ method, after the station finds the lineidle, it sends its frame immediately. If the line isnot idle, it continuously senses theline until it finds it idle. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above
Last Answer : 1-persistent
Description : In_____, each station transmits its data in itsassignedtime slot. A) FDMA B) TDMA C) CDMA D) none of the above
Last Answer : TDMA
Description : In_____, each station is allocateda time slotduring which it can send data. Each stationtransmits its data in itsassigned time slot. A) FDMA B) TDMA C) CDMA D) none of the above
Description : In______, each station is allocated a band to send its data. In other words, each band is reservedfor a specific station,and it belongs to the station all the time. A) FDMA B) TDMA C) CDMA D) none of the above
Last Answer : FDMA
Description : ________ requires that each station first listento the medium before sending. A) MA B) CSMA C) FDMA D) CDMA
Last Answer : CSMA
Description : The Federal Communications Commission (FCC) allows ______ kHz for each FM station. A) 20 B) 100 C) 200 D) none of the above
Last Answer : 100
Description : The Federal Communications Commission (FCC) allows ______kHz for each AM station. A) 5 B) 10 C) 20 D) none of the above
Last Answer : 0
Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)
Last Answer : PCF
Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer
Last Answer : a. network layer
Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer
Last Answer : A. network layer
Description : The minimax algorithm computes the minimax decision from the current state. It uses a simple recursive computation of the minimax values of each successor state, directly implementing the defining equations. The ... are backed up through the tree as the recursion unwinds. a) True b) False
Last Answer : a) True
Description : In SONET each frame lasts _______ microseconds. A) 20 B) 64 C) 128 D) none of the above
Last Answer : 64
Description : In hexadecimal colon notation, a 128-bit address isdivided into _______ sections, each _____hexadecimal digits in length. A) 8: 2 B) 8: 3 C) 8: 4 D) none of the above
Last Answer : 8: 4
Description : RPB creates a shortest path _______ tree from thesourceto each destination. A) unicast B) multicast C) broadcast D) none of the above
Last Answer : broadcast
Description : In the _______ treeapproach, each router needs tohave oneshortest path tree for each group. A) group-shared B) source-based C) a or b D) none of the above
Last Answer : source-based
Description : The _______ protocol allows the administrator toassign acost, called the metric, to each route. A) OSPF B) RIP C) BGP D) none of the above
Last Answer : OSPF
Description : An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started. A. Similar B. smaller C. different D. larger
Last Answer : C. different
Description : Would you follow this polling by the NYT all the way to Nov. 6?
Last Answer : Nope – I want to do a Rip Van Winkle and fall asleep until November 7 and maybe permanently after that.
Description : How does TN have my home phone number in FL as part of their call list for polling?
Last Answer : You may have used it for something like a bank account or some other business in TN, and it cross referenced in a database.