logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking See What Others Are Saying!
  • Question
  • The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer


  • Options
  • A. An additional token is added for every 1,000 nodes
  • B. The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500
  • C. The network becomes less efficient
  • D. After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
  • E. The network becomes more efficient

  • Correct Answer
  • The network becomes more efficient 


  • More questions

    • 1. The ESD wrist strap is designed to protect PC Components or Service Technicians?

    • Options
    • A. PC Components
    • B. Service Technicians
    • C. Both
    • Discuss
    • 2. The ESD wrist strap is designed to protect PC Components or Service Technicians?

    • Options
    • A. PC Components
    • B. Service Technicians
    • C. All of the above
    • D. None of the above
    • Discuss
    • 3. What service is not monitored by inetd?

    • Options
    • A. SSH
    • B. time
    • C. ntalk
    • D. finger
    • E. None of the above
    • Discuss
    • 4. Which of the following decides which systems development projects to work on first?

    • Options
    • A. data diagram
    • B. project dictionary
    • C. systems flowcharts
    • D. steering committee
    • E. None of the above
    • Discuss
    • 5. Resistance is measured in?

    • Options
    • A. Volts
    • B. Amps
    • C. Watts
    • D. Ohms
    • E. None of the above
    • Discuss
    • 6. Which option is used with rm command to make the command prompt the user with each filename and a?, before acting on it

    • Options
    • A. -r
    • B. -x
    • C. -i
    • D. -1
    • E. None of the above
    • Discuss
    • 7. Which option will be used with touch command to change the access time?

    • Options
    • A. -a
    • B. -b
    • C. -t
    • D. -h
    • E. None of the above
    • Discuss
    • 8. Routers are often used to implement FIREWALLS

    • Options
    • A. True
    • B. False
    • Discuss
    • 9. What is the i/o address for com2?

    • Options
    • A. 2vb
    • B. 2f8
    • C. 8f8
    • D. 330
    • Discuss
    • 10. "Parity" errors usually indicate bad memory.

    • Options
    • A. True
    • B. False
    • Discuss


    Comments

    There are no comments.

Enter a new Comment