logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • CSMA (Carrier Sense Multiple Access) is


  • Options
  • A. a method of determining which device has access to the transmission medium at any time
  • B. a method access control technique for multiple-access transmission media.
  • C. a very common bit-oriented data link protocol issued by ISO.
  • D. network access standard for connecting stations to a circuit-switched network
  • E. None of the above

  • Correct Answer
  • a method access control technique for multiple-access transmission media. 


  • Networking problems


    Search Results


    • 1. A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known as

    • Options
    • A. Aloha
    • B. Angle modulation
    • C. Amplitude modulation
    • D. modem
    • E. None of the above
    • Discuss
    • 2. When a group of computers is connected together in a small area without the help of telephone lines, it is called

    • Options
    • A. Remote communication network (RCN)
    • B. Local area network(LAN)
    • C. Wide area network (WAN)
    • D. Value added network (VAN)
    • E. None of the above
    • Discuss
    • 3. An international standard, multilevel set of protocols to promote compatibility among telecommunications networks. Select the best fit for answer:

    • Options
    • A. Network Server
    • B. Virtual Private Network
    • C. Network operating system
    • D. OSI
    • Discuss
    • 4. A global network of millions of business, government, educational, and research networks; computer systems; database; and end users. Select the best fit for answer:

    • Options
    • A. Internet works
    • B. The Internet
    • C. Internet revolution
    • D. Internet technologies
    • E. None of the above
    • Discuss
    • 5. Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called?

    • Options
    • A. Telemeeting
    • B. Telemailing
    • C. Teleconferencing
    • D. Teletalking
    • E. None of the above
    • Discuss
    • 6. The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer.

    • Options
    • A. Duplicate addresses
    • B. Duplicate pools
    • C. Duplicate subnets
    • D. Duplicate default gateways
    • E. None of the above
    • Discuss
    • 7. UDP is:

    • Options
    • A. Not a part of the TCP/IP suite
    • B. Connection oriented and unreliable
    • C. Connection orientated and reliable
    • D. Connectionless and unreliable
    • Discuss
    • 8. A network which is used for sharing data, software and hardware among several users owning microcomputers is called

    • Options
    • A. WAN
    • B. MAN
    • C. LAN
    • D. VAN
    • E. None of the above
    • Discuss
    • 9. Which of the following TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?

    • Options
    • A. RARP
    • B. FTP
    • C. TFTP
    • D. TELNET
    • E. None of the above
    • Discuss
    • 10. You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use?

    • Options
    • A. 255.224.0.0
    • B. 255.240.0.0
    • C. 255.248.0.0
    • D. 255.252.0.0
    • E. 255.254.0.0
    • Discuss


    Comments

    There are no comments.

Enter a new Comment