________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different
stations.
A)
Random access
B)
Controlledaccess
C)
Channelization
D)
none of the above

1 Answer

Answer :

Channelization

Related questions

Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access

Description : ________is the set of techniques that allows the simultaneous transmission of multiple signalsacrossa single data link. A) Demodulating B) Multiplexing C) Compressing D) None of the above

Last Answer : Multiplexing

Description : A ________is a device in which the stations are completely unaware of its existence. A) passive hub B) repeater C) simple bridge D) transparent bridge

Last Answer : transparent bridge

Description : The ______ technique expands the bandwidthof a signal by replacing each data bit with n bits. A) FDM B) DSSS C) FHSS D) TDM

Last Answer : DSSS

Description : A pure ALOHA Network transmits 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ______. a. 0.384 b. 0.184 c. 0.286 d. 0.58

Last Answer : b. 0.184

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : Write about Channel Access on links. Multiple Access Techniques Frequency Division Multiple Access

Last Answer : ∙ In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. ∙ Each station is allocated a band to send its data. ∙ When any one frequency level is ... called chips. ∙ Chips will be added with the original data and it can be transmitted through same

Description : A ________is a local address. Its jurisdiction is overa local network. A) physical B) logical C) a and b D) noneof the above

Last Answer : physical

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : Multicast link state routing uses the _______ tree approach. A) source-based B) group-shared C) a or b D) none of the above

Last Answer : source-based

Description : A single channel is shared by multiple signals by _____ a. analog modulation b. digital modulation c. multiplexing d. phase modulation

Last Answer : c. multiplexing

Description : In communication satellite, multiple repeaters are known as a. detector b. modulator c. stations d. transponders

Last Answer : transponders

Description : In IEEE 802.11, a___ is made of stationary or mobile wireless stations and anoptional central base station, known as the access point (AP). A) ESS B) BSS C) CSS D) none of the above

Last Answer : BSS

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : a continuous frequency capableof being modulated or impressed witha second signa

Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer

Last Answer : b. media access control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above

Last Answer : d. All the above

Description : The two sublayers of a Data Link layer are a. LLC Logical Link Control Layer b. MAC Medium Access Control Layer c. Both A and B d. Data Layer

Last Answer : c. Both A and B

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer

Last Answer : B. media access control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : Which of the following is the multiple access protocol for channel access control? a. CSMA/CD b. CSMA/CA c. Both CSMA/CD & CSMA/CA d. HDLC

Last Answer : c. Both CSMA/CD & CSMA/CA

Description : Which of the following is the multiple access protocol for channel access control? A. CSMA/CD B. CSMA/CA C. Both CSMA/CD & CSMA/CA D. HDLC

Last Answer : C. Both CSMA/CD & CSMA/CA

Description : A radio communications link is to be established via the ionosphere. The maximum virtual height of the layer is 100 km at the midpoint of the path and the critical frequency is 2 MHz. The distance between stations is 600 ... optimum working frequency? A. 6.32 MHz B. 2.1 MHz C. 5.4 MHz D. 1.8 MHz

Last Answer : C. 5.4 MHz

Description : How can multiple earth stations share a satellite on the same frequencies? A. Frequency reuse B. Multiplexing C. Mixing D. Frequency hopping

Last Answer : A. Frequency reuse

Description : The _________ product defines the number ofbits that can fill the link. A) bandwidth-period B) frequency-amplitude C) bandwidth-delay D) delay-amplitude

Last Answer : bandwidth-delay

Description : In astar-topology Ethernet LAN, _______ is just a point where the signals coming from different stations collide; it is thecollision point. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)

Last Answer : A passivehub

Description : ________is easy to use wizard that helps to create a presentation by leading through some basic questions: a) Auto Content Wizard b) Auto Presentation Wizard c) Sample Presentation Wizard d) None of These

Last Answer : a) Auto Content Wizard

Description : ________is the business through which new ideas and innovations are given a sharp and are converted into useful products and services . A. Market Leadership. B. Challenge. C. Joy of Creation. D. Growth.

Last Answer : C. Joy of Creation.

Description : In a computer, what does RAM stand for ? (1) Ready to Access Memory (2) Read At-a-time Memory (3) Random Access Memory (4) Readily Available Memory

Last Answer :  Random Access Memory

Description : Which data communication method is used to transmit the data over a serial communication link? a. simplex b. half-duplex c. full-duplex d. b and c e. None of above

Last Answer : full-duplex

Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : A pure ALOHA Network transmit 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is .............. (A) 0.384 (B) 0.184 (C) 0.286 (D) 0.586

Last Answer : (B) 0.184

Description : Channelization of streams is designed to reduce flooding by ___________. a) Speeding the passage of floodwaters b) Reducing bank erosion c) Slowing down river velocity so as to reduce damage d) Increase the meandering of streams

Last Answer : a) Speeding the passage of floodwaters

Description : Internal and external factors that affect message reception by the students in the classroom are referred to as (A) feedback (B) fragmentation (C) channelization (D) noise

Last Answer : Answer: D

Description : Transforming thoughts, ideas and messages into verbal and non-verbal signs is referred to as (A) channelization (B) mediation (C) encoding (D) decoding

Last Answer : (C) encoding

Description : Technique of using disk space to make programs believe that the system contains more Random Access Memory(RAM) than is actually available is called ______ A. Random Access Memory B. Primary Memory C. Secondary Memory D. Virtual Memory

Last Answer : D. Virtual Memory

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned

Last Answer : multi-tenancy

Description : SaaS supports multiple users and provides a shared data model through _________ model. A. single-tenancy B. multi-tenancy C. multiple-instance D. None of the above

Last Answer : multi-tenancy

Description : SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned

Last Answer : multi-tenancy

Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction

Last Answer : Memory protection

Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above

Last Answer : TDD-TDMA

Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above

Last Answer : polling