Computer Science - Networking

36. 

The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer

A. An additional token is added for every 1,000 nodes
B. The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500
C. The network becomes less efficient
D. After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
E. The network becomes more efficient

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

37. 

A characteristic of a multiprogramming system is:

A. simultaneous execution of program instructions from two applications
B. concurrent processing of two or more programs
C. multiple CPUs
D. All the above
E. None of the above

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

38. 

When a host knows its physical address but not its IP address, it can use _____.

A. RARP
B. ARP
C. IGMP
D. ICMP
E. None of the above

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

39. 

What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?

A. Handshaking
B. Modem options
C. Protocol
D. Duplexing
E. None of the above

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

40. 

A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer:

A. Fiber optic cables
B. Cellular phone systems
C. Telecommunications processors
D. Telecommunications software

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.