CS610-Midterm
1 / 50
Most LANs that employ ring topology use an access mechanism known as-------
2 / 50
he next hop to which a packet is sent depends only on
3 / 50
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
4 / 50
In ---------, network occupies larger areas like cities & countries.
5 / 50
In Point-to-Point topology there are two topologies.
6 / 50
-------------- have advantages arisen from the size and ease of computation.
7 / 50
A Bridge can ________
8 / 50
A bridges function in the _________ layers(s).
9 / 50
In -------------, network occupies the smaller area like a room a floor or a building
10 / 50
__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
11 / 50
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .
12 / 50
------ has no way to determine the cause of the problem.
13 / 50
Computer networks are often called -------------- because they use packet technology.
14 / 50
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
15 / 50
------ Program sends a message to a remote computer and orts whether the computer responds.
16 / 50
17 / 50
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
18 / 50
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_____
19 / 50
The term -------- is used to denote the definition of a packet used with a specific type of network.
20 / 50
17 A network with throughput T and delay D has a total of ________ bit in transit at any time.
21 / 50
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
22 / 50
A ---------- provide a mechanism that a customer can use to set a physical address.
23 / 50
Computers attached to an Ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.
24 / 50
25 / 50
_________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
26 / 50
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
27 / 50
The product of delay and throughput measures the _____ of data that can be present on the network.
28 / 50
29 / 50
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
30 / 50
Computers attached to an Ethernet use ------ in which a computer waits for the other to be idle before transmitting a frame.
31 / 50
32 / 50
FDDI can transmits data at a rate of -----
33 / 50
34 / 50
35 / 50
FDDI can transmits data at a rate of ----------
36 / 50
Local Talk is a LAN technology that employs -------------
37 / 50
An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
38 / 50
39 / 50
----- Program sends a message to a remote computer and orts whether the computer responds.
40 / 50
________ has a jitter zero
41 / 50
Formally named __________ informally known as the thick wire Ethernet or Thick net.
42 / 50
43 / 50
44 / 50
Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.
45 / 50
A network uses a ------ if all computers attach to a central point
46 / 50
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.
47 / 50
Which of the following is a connecting device?
48 / 50
49 / 50
When an application--------------- data, it makes a copy of the data available to all other computers on the network.
50 / 50
Your score is
The average score is 0%
Restart quiz