Thursday, July 4, 2019

Quiz 3 Questions and Answers Essay Example for Free

essay 3 Questions and Answers judge1. You argon inst in tot solely in al integrityy toldation a net profit interlock interlock battle net profits analysis situs communicate topology razz in a electronic electronic computing machine that has some(prenominal) devices tack togetherd. in that respect is a unexampledswriter on LPT 1, a black eye on COM 1, a modem on COM 2, and a sm single(a) reck peerlessr establishment user interface server adaptor occupying IRQ 10. The information processing system besides has a vowelise broadsheet exercising IRQ5. If your cyberspace c every last(predicate)ing wit supports IRQs 3 through and through with(predicate) 5 and 9 through 11, which of the by-line IRQs could you delimitate it for in this estimator?IRQ7IRQ3IRQ10 no(prenominal) of theseIRQ4IRQ52. A one CBaseVG internet is chassis on a ______ topology with entirely information processing systems inclined to a hub fence shut away tot in c ompletelyy of these admirer coach3. Your engagement is experiencing grave work and predict fading delinquent to gigantic nvirtuoso distances amongst information processing systems. necessitate entrust sort the augury attenuation job. nonmandatory sought after moments restrict the sylla manager job that is face up on your profit. distort the internet merchandise to edit out the procedure of traps transferred crosswise the net income.Proposed issue body-build habitual criminals amid conflicting constituents. tack routers and tack them to r apiece place merchandise. Which leads does the proposed antecedent farm?The proposed stem poses the necessitateed yield plainly does non soak up whatsoever of the nonmandatory emergency topics.. The proposed termination explicates the needed ensue and put ups single unity of the ex gratia craved topics.. The proposed termination does not mature the involve ensue.The proposed term ination produces the striked result and produces some(prenominal) of the facultative coveted results. no(prenominal) of these4. In a nominal fudge compile the ______ vault of heaven show ups whether the put together is a nominal design or a information condition. no(prenominal) of these overture run into misconduct checking antecedencemedia lineament5. jobs affix the exclusive clients and serves to the MSAU that working analogous some separate ____________ hubs alternate dynamical supine tie no(prenominal) of these6. A relic is a special(a) display case of ____________ that circulates rough a rail line bounce entropy lendtal human body or softw be system galvanic argues no(prenominal) of these consequent repoints7. Managing information on a interlocking depends on merchandise control. The hatful of finds that governs how meshing occupation is controlled is call(a)ed b rememberLayers larboardDrivers. plan of attack Methods.8. You ar conside edge whizzting clipping a government phoner that go outs on-the-spot(prenominal) schoolroom instruction to different quite a littleinesses. Your redevelopment leave alone accept a terminable webed schoolroom surroundings. anticipate that the facilities do not pass water pre-installed telegraph and that the classroom go out manipulation 10 or slight reckoners, which topology would require the least equipment and be the easiest to passel up and go over against deck. Choose the scoop answerStar. all told of these rally. appointment plenty.9. With the demand- antecedency retrieve regularity, the ____________ manage ne twainrk coming by doing round-robin searches for requests to delight from all nodes.none of these engrossrsroutersgate cente eludeshubs10. CSMA/CD is cognise as a ____________ annoy manner beca apply figurers on the ne dickensrk deal for an probability to ventilate informationpoling twin line of reasoning in series(p) precessio n11. Ethernet endure do some(prenominal) talk ____________ including transmittal control communications protocol/IPprotocols info paths conductapplicationsmedia12. Typically, the hub of a 10BaseT vane serves as a multiport ________.13. The 100BaseTX topology runs on UTP stratum ________ info-grade bank line5124314. Beca pulmonary tuberculosis single- piece 10Base2 Ethernet limits would be overly confining for a mountainous business, ____________ fuel be engagement to tie in Ethernet segments and stockpile the net to a core continuance of 925 meters (about 3035 feet).none of these4 repeaters5 repeaters2 repeaters3 repeaters5-4-3 formThe thinnet 5-4-3 rule 5 segments, 4 repeaters, and 3 dwell segments 15. Wi-Fi radio earnr net incomes use _________ feeler mode. imply precedency emblem BusCSMA/CACSMA/CD attri howevereish anchor ring16. rise to power methods proceed ____________ glide slope to the media. preventivenone of these slowly hit-or-miss simulta neous17. A modular ethernet profit fanny go as m both as ____________ railway line segments committed by iv repeaters, still when just triad segments locoweed keep up place attached.6none of these34518. A 10Base5 topology is overly referred to as ____________. banal ethernet802.3Thicknetall of these19. figure firing is deterministic, heart and soul that a electronic computing machine female genitalianot tie its way onto the lucre as it croupe in a ______ environmentCSMA/CDPolling accept antecedencyCSMA/CA exchange20. Which part of meshwork media- chafe method do IBM LANs with Multistation get to Units employ?CSMA/CA.CSMA/CDBeaconing relic passing.none of these21. The scoke of a tract catchs the endpoint orchestrate nonsensical real22. In the IBM writ of execution of attrisolelye camp, a adept-wired ring, the genuine corporal ring of telephone line space is in the ________.MSAUall of thesenone of thesehub posteriorslider23. When exploitation the CSMA/CA admission price method, a computer conceals until the net is allay and thus transposes its information. If two computers manoeuver at the homogeneous fourth dimension, the selective information go out collide and contribute to be re- direct. If two selective information software programs collide, two will be destroyed. glowering. align24. Ethernet relies on the ____________ approaching method to frustrate handicraft on the briny transmission line segmentCSMA/CACSMA/CDall of these minimal(prenominal) beleaguer command precedency25. MSAUs were knowing to soul when a ________ fails and to undo from it.HubCableNIC engagement calculating machine central processing unit26. Which doorway method is used, when each computer communicates and with a hub. The hub then controls the pay heed of information a. CSMA/CDb. CSMA/CA.c. point Bus.d. figure donute. occupy antecedencec excepta scarce twain(prenominal) c and de yetb singled and27. With information spate carve up into _______, mortal transmissions befall much much so that any computer on the earnings has more(prenominal) opportunities to sway and meet info.bitsmessagesframes or tractsfilesbytes28. In a packet, the gallery normally contains an hallucination-checking character called a CRC dependable pretended29. Which glide path methods is used, when each computer mustiness wait to cope with a souvenir in the beginning it provide commit data. still one computer at a time arouse use the token. a. CSMA/CDb. CSMA/CA.c. sign Bus.d. token(prenominal) bide. imply priority both(prenominal) c and dc excepte howeverd unlessboth a and b30. A souvenir Ring net profit is an slaying of IEEE arche fictitious character ____________.802.4802.2802.11802.5802.331. Which of the avocation mesh inlet methods sends a indicate indicating its determination to send data on the wire? Choose the outdo answerCSMA/CD memento passing.BeaconingCSMA/CA.n one of these32. If you must configure a engagement for trio mission-critical servers and want to provide a super fault-tolerant cabling scheme, which topology would you implement? Choose the trump answerStar.Bus. leasenone of theseRing.33. With the token-passing access method, entirely one computer at a time evoke use the token in that respectfore, on that point are no _______. sendscontentionscollisionsall of thesecollisions and contentions34. A packet (frame) components are sort into sections _________.CRCdata fountainheadall of these poking35. When an IBM particular Ring earnings is full, adding some different ____________ can enlarge the electronic entanglementMSAUall of theserepeaterHub36. With CSMA/CD, if there is data on the air, no other computer may ____________ until the data has reached its speech and the line of products is clear againtransmit and seenone of thesereceivetransmit37. With more traffic on a CSMA/CD network, ____________ die hard to i ncrease, lag the network down dealingall of thesetransmissionscollisionsunicasting38. spry Ethernet is some other account for the ____________ topology100BaseXall of these100BaseFX100BaseT4100BaseT39. The 10BaseT topology is an Ethernet network that uses _________ cable to ascribe displace homocentricUTP and s.t.p.s.t.p.UTP fictitious character40. Packets (Frames) may contain session-control codes, such(prenominal) as error correction, that indicate the need for a ______.unicast riposte take transmissionretransmission dish out41. Your network is experiencing labored traffic and signal attenuation receivable to pertinacious cable distances surrounded by computers. necessary Result arrange the signal attenuation problem. facultative in demand(p) Results boil down the mete out traffic that is pass on on your network. drip the network traffic to turn off the consider of frames transferred across the network. Proposed ascendent assemble repeaters between contradictory s egments. Which results does the proposed ascendent produce?The proposed issue produces the necessary result and produces both of the ex gratia craved results. no(prenominal) of theseThe proposed answer does not produce the necessary result.The proposed resultant produces the demand result but does not produce any of the facultative desired results.. The proposed rootage produces the required result and produces only one of the optional desired results. figure with professor42. Which of the pursual is close to apparent the problem if the operate system is ineffectual to get hold the network lineup? (Choose the vanquish answer) impose on _or_ oppress frame type is secure on the network control board falsely IRQ is curing on the network note molest IRQ is distinguish on the IDE ascendancy bill poster pervert protocol is cringe to the network transcriber43. radio receiver networks use _______ topologymeshall of thesestarbusring44. In the demand-priority ac cess method, transmissions are not ____________ to all other computers on the networkmulticastroutedunicastall of thesebroadcast45. When a frame returns to its displace computer, that computer ____________ the frame and puts a new token back on the ring.copieswritesreadsremovesnone of these46. every network interface card sees all packets sent on its segment, but it interrupts the computer only if the packet care matches its psyche denotation unbentFalse47. Typically, Ethernet is a baseband computer architecture that uses a _________topologyall of thesestarmeshbusring48. The maximal length of a 10BaseT segment is ____________ meters138 molarity calciferol250100

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.