Sunday, April 7, 2019

Quiz 3 Questions and Answers Essay Example for Free

Quiz 3 Questions and Answers Essay1. You are inst whole(a)ing a net profit card in a computer that has several devices configured. There is a printer on LPT 1, a mouse on COM 1, a modem on COM 2, and a SCSI host adapter occupying IRQ 10. The computer also has a auditory sensation card using IRQ5. If your communicate card supports IRQs 3 through 5 and 9 through 11, which of the sideline IRQs could you set it for in this computer?IRQ7IRQ3IRQ10 no(prenominal) of theseIRQ4IRQ52. A 100BaseVG lucre is build on a ______ topographic anatomy with all computers attached to a hub pluralitymeshall of thesestarbus3. Your net is experiencing expectant handicraft and signal fading due to long cable distances between computers.Required Result reclaim the signal attenuation problem. facultative Desired ResultsReduce the broadcast traffic that is present on your communicate. r each(prenominal) the network traffic to discredit the number of frames transferred across the network.Proposed So lution install repeaters between distant segments. Install routers and configure them to filter broadcast traffic. Which results does the proposed resolve produce?The proposed ancestor produces the mandatory result but does non produce any of the nonobligatory desired results.. The proposed solution produces therequired result and produces that one of the ex gratia desired results.. The proposed solution does not produce the required result.The proposed solution produces the required result and produces twain of the optional desired results.None of these4. In a minimal fence frame the ______ field indicates whether the frame is a memento frame or a data frame.none of these memory irritate Controlerror checking precedencemedia type5. Cables attach the individual clients and serves to the MSAU that works like other ____________ hubsswitchactivepassive bracenone of these6. A token is a special type of ____________ that circulates around a cable ringdata transmissionframe or packetelectrical signalsnone of theseserial signals7. Managing data on a network depends on traffic control. The set of rules that governs how network traffic is controlled is calledChannelsLayersInterfaceDrivers.Access Methods.8. You are considering starting a training company that provides on-site classroom instruction to various businesses. Your go will include a temporary networked classroom environment. Assuming that the facilities do not have pre-installed wire and that the classroom will use 10 or less computers, which topology would require the least equipment and be the easiest to set up and tear down. Choose the best answerStar.All of theseRing.MeshBus.9. With the demand- precession rag regularity, the ____________ manage network addition by doing round-robin searches for requests to send from all nodes.none of theseusersroutersgatewayshubs10. CSMA/CD is known as a ____________ access method because computers on the network compete for an opportunity to send datapoli ngparallelcontentionsequentialpriority11. Ethernet can use several communication ____________ including TCP/IPprotocolsdata pathschannelsapplicationsmedia12. Typically, the hub of a 10BaseT network serves as a multiport ________.13. The 100BaseTX topology runs on UTP Category ________ data-grade cable5124314. Because single-segment 10Base2 Ethernet limits would be too confining for a large business, ____________ can be used to heart and soul Ethernet segments and extend the network to a total length of 925 meters (about 3035 feet).none of these4 repeaters5 repeaters2 repeaters3 repeaters5-4-3 ruleThe thinnet 5-4-3 rule 5 segments, 4 repeaters, and 3 populated segments 15. Wi-Fi Wireless networks use _________ access method. involve priority relic BusCSMA/CACSMA/CDToken Ring16. Access methods prevent ____________ access to the media.preemptiveNone of theseslowrandomsimultaneous17. A standard ethernet network can accede as many as ____________ cable segments connected by four repeat ers, but only tercet segments can have stations attached.6none of these34518. A 10Base5 topology is also referred to as ____________.standard ethernet802.3Thicknetall of these19. Token passing is deterministic, meaning that a computer cannot pinch its way onto the network as it can in a ______ environmentCSMA/CDPollingDemand priorityCSMA/CASwitching20. Which type of network media-access method do IBM LANs with Multistation Access Units employ?CSMA/CA.CSMA/CDBeaconingToken passing.None of these21. The trailer of a packet contains the coating addressFalseTrue22. In the IBM capital punishment of Token Ring, a star-wired ring, the actual physical ring of cable is in the ________.MSAUall of thesenone of thesehub repeater23. When using the CSMA/CA access method, a computer waits until the network is quiet and then shifts its data. If two computers transpose at the same time, the data will collide and have to be re-sent. If two data packets collide, both will be destroyed.False.True2 4. Ethernet relies on the ____________ access method to regulate traffic on the main(prenominal) cable segmentCSMA/CACSMA/CDall of theseToken RingDemand Priority25. MSAUs were designed to sense when a ________ fails and to disconnect from it.HubCableNICNetworkComputer CPU26. Which access method is used, when each computer communicates only with a hub. The hub then controls the flow of data a. CSMA/CDb. CSMA/CA.c. Token Bus.d. Token Ringe. Demand priorityc onlya onlyboth c and de onlyb onlyd only27. With data masses divided into _______, individual transmissions run more frequently so that every computer on the network has more opportunities to transmit and let data.bitsmessagesframes or packetsfilesbytes28. In a packet, the foreland usually contains an error-checking component called a CRCTrueFalse29. Which access methods is used, when each computer must wait to receive a token before it can transmit data. Only one computer at a time can use the token. a. CSMA/CDb. CSMA/CA.c. Tok en Bus.d. Token Ringe. Demand priorityboth c and dc onlye onlyd onlyboth a and b30. A Token Ring network is an implementation of IEEE standard ____________.802.4802.2802.11802.5802.331. Which of the following network access methods sends a signal indicating its intent to transmit data on the wire? Choose the best answerCSMA/CDToken passing.BeaconingCSMA/CA.None of these32. If you must configure a network for three mission-critical servers and want to provide a highly fault-tolerant cabling scheme, which topology would you implement? Choose the best answerStar.Bus.MeshNone of theseRing.33. With the token-passing access method, only one computer at a time can use the token therefore, there are no _______.broadcastingscontentionscollisionsall of thesecollisions and contentions34. A packet (frame) components are grouped into sections _________.CRCdataheaderall of thesetrailer35. When an IBM Token Ring network is full, adding another ____________ can enlarge the networkMSAUall of thesere peaterHub36. With CSMA/CD, if there is data on the cable, no other computer may ____________ until the data has reached its destination and the cable is clear againtransmit and receivenone of thesereceivetransmit37. With more traffic on a CSMA/CD network, ____________ tend to increase, slowing the network downbroadcastingall of thesetransmissionscollisionsunicasting38. steady Ethernet is another name for the ____________ topology100BaseXall of these100BaseFX100BaseT4100BaseT39. The 10BaseT topology is an Ethernet network that uses _________ cable to connect stations homocentricUTP and STPSTPUTPFiber40. Packets (Frames) may contain session-control codes, such as error correction, that indicate the urgency for a ______.unicastrecallstop transmissionretransmissionbroadcast41. Your network is experiencing heavy traffic and signal attenuation due to long cable distances between computers.Required ResultCorrect the signal attenuation problem.Optional Desired ResultsReduce the broadcast traffic that is present on your network. Filter the network traffic to reduce the number of frames transferred across the network. Proposed SolutionInstall repeaters between distant segments. Which results does the proposed solution produce?The proposed solution produces the required result and produces both of the optional desired results. None of theseThe proposed solution does not produce the required result.The proposed solution produces the required result but does not produce any of the optional desired results.. The proposed solution produces the required result and produces only one of the optional desired results. Check with Prof42. Which of the following is about likely the problem if the operating system is unable to detect the network card? (Choose the best answer) terms frame type is set on the network cardWrong IRQ is set on the network cardWrong IRQ is set on the IDE controller cardWrong protocol is bound to the network adapter43. Wireless networks use _______ topolo gymeshall of thesestarbusring44. In the demand-priority access method, transmissions are not ____________ to all other computers on the networkmulticastroutedunicastall of thesebroadcast45. When a frame returns to its sending computer, that computer ____________ the frame and puts a new token back on the ring.copieswritesreadsremovesnone of these46. Every network interface card sees all packets sent on its segment, but it interrupts the computer only if the packet address matches its individual addressTrueFalse47. Typically, Ethernet is a baseband architecture that uses a _________topologyall of thesestarmeshbusring48. The maximum length of a 10BaseT segment is ____________ meters1381000 euchre250100

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.