logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking See What Others Are Saying!
  • Question
  • Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.


  • Options
  • A. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
  • B. Ethernet, because it is cabled using fiber-optic cable
  • C. Token-Ring, because it uses a MAU
  • D. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
  • E. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies

  • Correct Answer
  • Ethernet, because it can be set up with most topologies and can use multiple transfer speeds 


  • More questions

    • 1. Claude Shannon described the operation of electronic switching circuits with a system of mathematical logic called:

    • Options
    • A. LISP
    • B. XLISP
    • C. Boolean algebra
    • D. neural networking
    • E. None of the above
    • Discuss
    • 2. An example of a medium-speed, switched communications service is

    • Options
    • A. Series 1000
    • B. Dataphone 50
    • C. DDD
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. A system design is said to be functionally modular if

    • Options
    • A. the system is able to handle all the function of the application
    • B. each module performs a specific function and can be developed relatively independently by programmers
    • C. the system makes extensive use of function. keys for maximum user assistance
    • D. the system is developed using structured programming through COBOL or PASCAL
    • E. None of the above
    • Discuss
    • 4. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

    • Options
    • A. True
    • B. False
    • Discuss
    • 5. A _____ is responsible for the design and control of a company's data base

    • Options
    • A. DBA
    • B. DBM
    • C. DPMA
    • D. EDP auditor
    • E. None of the above
    • Discuss
    • 6. An audit trail

    • Options
    • A. is used to make back-up copies
    • B. is the recorded history of operations performed on a file
    • C. can be used to restore lost information
    • D. All of the above
    • E. None of the above
    • Discuss
    • 7. What command is used with file named 'letter' to remove the executable permission from the user and assign read permission to the group and others?

    • Options
    • A. chmod go + x, u - x letter
    • B. chmod g - x, uo + r letter
    • C. chmod go + r, u + x letter
    • D. chmod u - x, go + r letter
    • E. None of the above
    • Discuss
    • 8. The speed at which the monitor accepts data is called:

    • Options
    • A. bandwidth
    • B. response time
    • C. interlacing
    • D. scanning
    • E. None of the above
    • Discuss
    • 9. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?

    • Options
    • A. Upgradability
    • B. Upward mobility
    • C. Universality
    • D. Upward compatibility
    • E. None of the above
    • Discuss
    • 10. Which of the following rules out the use of GO TO?

    • Options
    • A. Flowchart
    • B. HIPO-DIAGRAMS
    • C. Nassi-Shneiderman diagram
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment