Thursday, June 6, 2019

Quiz 3 Questions and Answers Essay Example for Free

Quiz 3 Questions and Answers Essay1. You are inst wholeing a cyberspace display panel in a computer that has several devices configured. There is a printer on LPT 1, a mouse on COM 1, a modem on COM 2, and a SCSI host transcriber occupying IRQ 10. The computer also has a sound card using IRQ5. If your communicate card supports IRQs 3 through 5 and 9 through 11, which of the following IRQs could you dumbfound it for in this computer?IRQ7IRQ3IRQ10 no(prenominal) of theseIRQ4IRQ52. A vitamin CBaseVG network is build on a ______ topology with all computers attached to a hubringmeshall of thesestarbus3. Your network is experiencing heavy traffic and channelise attenuation repayable to long cable distances between computers.Required ResultCorrect the signal attenuation problem.Optional Desired ResultsReduce the broadcast traffic that is present on your network. Filter the network traffic to reduce the number of frames transferred across the network.Proposed firmnessInstall rep eating firearms between distant segments. Install routers and configure them to filter broadcast traffic. Which results does the proposed final result bring out?The proposed solution nurtures the essential result but does not produce any of the optional desired results.. The proposed solution produces therequired result and produces completely one of the optional desired results.. The proposed solution does not produce the required result.The proposed solution produces the required result and produces both of the optional desired results.None of these4. In a keepsake Ring frame the ______ field indicates whether the frame is a nominal frame or a information frame.none of theseAccess Controlerror checkingprioritymedia type5. Cables attach the individual clients and serves to the MSAU that works like former(a) ____________ hubsswitchactivepassivebridgenone of these6. A token is a special type of ____________ that circulates around a cable ring entropy transmissionframe or big buckselectrical signalsnone of theseserial signals7. Managing data on a network depends on traffic control. The set of towers that governs how network traffic is controlled is calledChannelsLayersInterfaceDrivers.Access Methods.8. You are considering starting a training company that provides on-site classroom instruction to various businesses. Your service leave alone include a temporary networked classroom environment. Assuming that the facilities do not have pre-installed wiring and that the classroom bequeath use 10 or slight computers, which topology would require the least equipment and be the easiest to set up and tear down. Choose the best answerStar.All of theseRing.MeshBus.9. With the demand-priority admission method, the ____________ manage network access by doing round-robin searches for requests to send from all nodes.none of theseusersroutersgate moodshubs10. CSMA/CD is known as a ____________ access method because computers on the network compete for an opportuni ty to send datapolingparallelcontentionsequentialpriority11. Ethernet can use several communication ____________ including TCP/IPprotocolsdata pathschannelsapplicationsmedia12. Typically, the hub of a 10BaseT network serves as a multiport ________.13. The 100BaseTX topology runs on UTP Category ________ data-grade cable5124314. Because single-segment 10Base2 Ethernet limits would be too confining for a galactic business, ____________ can be used to join Ethernet segments and extend the network to a total length of 925 meters (about 3035 feet).none of these4 repeaters5 repeaters2 repeaters3 repeaters5-4-3 ruleThe thinnet 5-4-3 rule 5 segments, 4 repeaters, and 3 populated segments 15. Wi-Fi Wireless networks use _________ access method.Demand priority emblem BusCSMA/CACSMA/CD keepsake Ring16. Access methods prevent ____________ access to the media.preemptiveNone of theseslowrandomsimultaneous17. A standard ethernet network can combine as many as ____________ cable segments connected by four repeaters, but only three segments can have stations attached.6none of these34518. A 10Base5 topology is also referred to as ____________.standard ethernet802.3Thicknetall of these19. Token passing is deterministic, meaning that a computer cannot force its way onto the network as it can in a ______ environmentCSMA/CDPollingDemand priorityCSMA/CASwitching20. Which type of network media-access method do IBM LANs with Multistation Access Units employ?CSMA/CA.CSMA/CDBeaconingToken passing.None of these21. The trailer of a packet contains the destination address glumTrue22. In the IBM writ of execution of Token Ring, a star-wired ring, the actual physical ring of cable is in the ________.MSAUall of thesenone of thesehubRepeater23. When using the CSMA/CA access method, a computer waits until the network is quiet and then transmits its data. If two computers transmit at the same time, the data will collide and have to be re-sent. If two data packets collide, both will be destroye d.False.True24. Ethernet relies on the ____________ access method to regulate traffic on the main cable segmentCSMA/CACSMA/CDall of theseToken RingDemand Priority25. MSAUs were designed to sense when a ________ fails and to disconnect from it.HubCableNICNetworkComputer CPU26. Which access method is used, when each computer communicates only with a hub. The hub then controls the flow of data a. CSMA/CDb. CSMA/CA.c. Token Bus.d. Token Ringe. Demand priorityc onlya onlyboth c and de onlyb onlyd only27. With data masses divided into _______, individual transmissions occur much frequently so that every computer on the network has more opportunities to transmit and receive data.bitsmessagesframes or packetsfilesbytes28. In a packet, the header usually contains an error-checking role called a CRCTrueFalse29. Which access methods is used, when each computer must wait to receive a token before it can transmit data. however one computer at a time can use the token. a. CSMA/CDb. CSMA/CA.c. Token Bus.d. Token Ringe. Demand priorityboth c and dc onlye onlyd onlyboth a and b30. A Token Ring network is an implementation of IEEE standard ____________.802.4802.2802.11802.5802.331. Which of the following network access methods sends a signal indicating its intent to transmit data on the wire? Choose the best answerCSMA/CDToken passing.BeaconingCSMA/CA.None of these32. If you must configure a network for three mission-critical servers and want to provide a highly fault-tolerant cabling scheme, which topology would you implement? Choose the best answerStar.Bus.MeshNone of theseRing.33. With the token-passing access method, only one computer at a time can use the token therefore, there are no _______.broadcastingscontentionscollisionsall of thesecollisions and contentions34. A packet (frame) components are grouped into sections _________.CRCdataheaderall of thesetrailer35. When an IBM Token Ring network is full, adding some other ____________ can enlarge the networkMSAUall of theserepeaterHub36. With CSMA/CD, if there is data on the cable, no other computer may ____________ until the data has reached its destination and the cable is clear againtransmit and receivenone of thesereceivetransmit37. With more traffic on a CSMA/CD network, ____________ tend to increase, slowing the network downbroadcastingall of thesetransmissionscollisionsunicasting38. Fast Ethernet is another name for the ____________ topology100BaseXall of these100BaseFX100BaseT4100BaseT39. The 10BaseT topology is an Ethernet network that uses _________ cable to connect stationsCoaxialUTP and STPSTPUTPFiber40. Packets (Frames) may contain session-control codes, such as error correction, that indicate the need for a ______.unicastrecallstop transmissionretransmissionbroadcast41. Your network is experiencing heavy traffic and signal attenuation due to long cable distances between computers.Required ResultCorrect the signal attenuation problem.Optional Desired ResultsReduce the broadcast traf fic that is present on your network. Filter the network traffic to reduce the number of frames transferred across the network. Proposed SolutionInstall repeaters between distant segments. Which results does the proposed solution produce?The proposed solution produces the required result and produces both of the optional desired results. None of theseThe proposed solution does not produce the required result.The proposed solution produces the required result but does not produce any of the optional desired results.. The proposed solution produces the required result and produces only one of the optional desired results. Check with Prof42. Which of the following is most probably the problem if the operating system is unable to detect the network card? (Choose the best answer)Wrong frame type is set on the network cardWrong IRQ is set on the network cardWrong IRQ is set on the IDE controller cardWrong protocol is bound to the network adapter43. Wireless networks use _______ topologyme shall of thesestarbusring44. In the demand-priority access method, transmissions are not ____________ to all other computers on the networkmulticastroutedunicastall of thesebroadcast45. When a frame returns to its sending computer, that computer ____________ the frame and puts a new token back on the ring.copieswritesreadsremovesnone of these46. every(prenominal) network interface card sees all packets sent on its segment, but it interrupts the computer only if the packet address matches its individual addressTrueFalse47. Typically, Ethernet is a baseband architecture that uses a _________topologyall of thesestarmeshbusring48. The maximum length of a 10BaseT segment is ____________ meters1381000500250100

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.