logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.


  • Options
  • A. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
  • B. Ethernet, because it is cabled using fiber-optic cable
  • C. Token-Ring, because it uses a MAU
  • D. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
  • E. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies

  • Correct Answer
  • Ethernet, because it can be set up with most topologies and can use multiple transfer speeds 


  • Networking problems


    Search Results


    • 1. Which of the following characteristics is not true of NetBEUI?

    • Options
    • A. Highly-customizable
    • B. Routable
    • C. Little configuration required
    • D. Fast for small networks to Self-tuning
    • Discuss
    • 2. Which of the following file retrieval methods use hypermedia?

    • Options
    • A. HTTP
    • B. WAIS
    • C. Veronica
    • D. Archie
    • E. None of the above
    • Discuss
    • 3. What is the name of the device that converts computer output into a form that can be transmitted over a telephone line?

    • Options
    • A. Teleport
    • B. Modem
    • C. Multiplexer
    • D. Concentrator
    • E. None of the above
    • Discuss
    • 4. You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign?

    • Options
    • A. 255.255.192.0
    • B. 255.255.224.0
    • C. 255.255.240.0
    • D. 255,255.248.0
    • E. 255.255.252.0
    • Discuss
    • 5. Microprogramming is

    • Options
    • A. assembly language programming
    • B. programming of minicomputers
    • C. control unit programming
    • D. macro programming of microcomputers
    • E. None of the above
    • Discuss
    • 6. Data communications monitors available on the software market include

    • Options
    • A. ENVIRON/1
    • B. TOTAL
    • C. BPL
    • D. Telenet
    • E. None of the above
    • Discuss
    • 7. You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?

    • Options
    • A. Token-Ring
    • B. CSMA/CD
    • C. Ethernet
    • D. CSMA/CA
    • E. ARCnet
    • Discuss
    • 8. The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are

    • Options
    • A. universal accessibility for private network Data Terminal Equipment (DTE)
    • B. adequate cost control mechanisms for administration of the private networks
    • C. to assign address to private network DTEs
    • D. a and b both
    • E. None of the above
    • Discuss
    • 9. MAC is

    • Options
    • A. a method of determining which device has access to the transmission medium at any time
    • B. a method access control technique or multiple-access transmission media
    • C. a very common bit-oriented data link protocol issued to ISO.
    • D. network access standard for connecting stations to a circuit-switched network
    • E. None of the above
    • Discuss
    • 10. Which application allows a user to access and change remote files without actual transfer?

    • Options
    • A. TELNET
    • B. NFS
    • C. FTP
    • D. DNS
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment