logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?


  • Options
  • A. CSMA/CD
  • B. Token passing
  • C. Collision detection
  • D. Time sharing
  • E. Switched repeaters

  • Correct Answer
  • Token passing 


  • Networking problems


    Search Results


    • 1. Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM?

    • Options
    • A. Amplitude modulation
    • B. Frequency-division multiple access
    • C. Frequency modulation
    • D. Frequency-shift keying
    • E. None of the above
    • Discuss
    • 2. The main difference between synchronous and asynchronous transmission is

    • Options
    • A. the clocking is derived from the data in synchronous transmission
    • B. the clocking is mixed with the data in asynchronous transmission
    • C. the pulse height is different.
    • D. the bandwidth required is different
    • E. None of the above
    • Discuss
    • 3. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. If Delta modulation is selected, then how many bits per second are actually sent?

    • Options
    • A. 32 kbps
    • B. 8 kbps
    • C. 128 kbps
    • D. 64 kbps.
    • Discuss
    • 4. Which of the following statements is incorrect?

    • Options
    • A. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission
    • B. Half-duplex line is a communication line in which data can move in two directions, but not at the same time.
    • C. Teleprocessing combines telecommunications and DP techniques in online activities.
    • D. Batch processing is the preferred processing mode for telecommunication operations
    • E. None of the above
    • Discuss
    • 5. A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length.

    • Options
    • A. 2 (m - 2)
    • B. 2 (2m - 1)
    • C. m - 1
    • D. (2m - l)/mJ
    • Discuss
    • 6. Which of the following summation operation is performed on the bits to check an error-detecting code?

    • Options
    • A. Codec
    • B. Coder-decoder
    • C. Checksum
    • D. Attenuation
    • E. None of the above
    • Discuss
    • 7. The X.25 standard specifies a

    • Options
    • A. technique for start-stop data
    • B. technique for dial access
    • C. DTE/DCE interface
    • D. data bit rate
    • E. None of the above
    • Discuss
    • 8. Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select?

    • Options
    • A. Star
    • B. Right
    • C. Token-Ring
    • D. Ethernet
    • E. Bus
    • Discuss
    • 9. A WATS arrangement

    • Options
    • A. is always less expensive than flat-rate service
    • B. is less expensive than flat-rate service only when the number of calls is large and the duration of each is short
    • C. is less expensive than flat-rate service only when the number of calls is small and the duration of each is long
    • D. is never less expensive than flat-rate service
    • E. None of the above
    • Discuss
    • 10. The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?

    • Options
    • A. A logical address that identifies the workstation
    • B. A physical address that is randomly assigned each time the computer is started
    • C. A physical address that is assigned by the manufacturer
    • D. The logical domain address for the workstation
    • E. An alias for the computer name
    • Discuss


    Comments

    There are no comments.

Enter a new Comment