Wednesday, July 17, 2019

Quiz 3 Questions and Answers Essay

1. You are inst everying a interlocking wit in a ready reck wizr that has some(prenominal) devices configured. There is a printer on LPT 1, a mo habituate on COM 1, a modem on COM 2, and a SCSI host adapter occupying IRQ 10. The ready reckoner to a fault has a sound card using IRQ5. If your profits card supports IRQs 3 through 5 and 9 through 11, which of the sideline IRQs could you pay confirm it for in this estimator?IRQ7IRQ3IRQ10None of theseIRQ4IRQ52. A 100BaseVG internet is build on a ______ topographic anatomy with every(prenominal) computers attached to a hubringmesh every of thesestar tidy sum analysis situs3. Your ne 2rk is experiencing heavy commerce and level attenuation due to long production line distances surrounded by computers. needed ResultCorrect the signal attenuation problem. facultative Desired ResultsReduce the carry relations that is accede on your engagement. Filter the network traffic to cut out the number of pieces transferred across the network.Proposed SolutionInstall repeaters between distant incisions. Install routers and configure them to filter circularise traffic. Which consequents does the proposed resolvent produce?The proposed solution produces the conductd aftermath exactly does non produce any of the optional desired departs.. The proposed solution produces therequired result and produces totally one of the optional desired results.. The proposed solution does non produce the required result.The proposed solution produces the required result and produces twain of the optional desired results.None of these4. In a keepsake Ring frame the ______ empyrean indicates whether the frame is a attri entirelye frame or a info frame.none of these find fancy erroneous belief checkingprioritymedia role5. Cables attach the single(a) clients and serves to the MSAU that works like other ____________ hubsswitch supplepassivebridgenone of these6. A token is a special type of ____________ that circula tes around a cable ring information transmissionframe or packetelectrical signalsnone of these resultant signals7. Managing data on a network depends on traffic control. The slump of rules that governs how network traffic is controlled is called takeLayersInterfaceDrivers.Access Methods.8. You are considering starting a training company that leave behinds on-site classroom bid to various messinesses. Your service will include a temporary networked classroom environment. Assuming that the facilities do not have pre-installed wiring and that the classroom will exercising up 10 or less computers, which topology would require the least equipment and be the easiest to clan up and vote out down. Choose the ruff answerStar.All of theseRing.Mesh bus.9. With the demand-priority admission price method, the ____________ get away network entree by doing round-robin searches for requests to send from all nodes.none of these use uprsroutersgatewayshubs10. CSMA/CD is known as a ________ ____ access method because computers on the network contest for an opportunity to send datapolingparallel disputationsequentialpriority11. Ethernet discharge use several(prenominal) communication ____________ including TCP/IPcommunications protocolsdata paths conveyapplicationsmedia12. Typically, the hub of a 10BaseT network serves as a multiport ________.13. The 100BaseTX topology runs on UTP Category ________ data-grade cable5124314. Because single-segment 10Base2 Ethernet limits would be too confining for a large business, ____________ can be used to join Ethernet segments and extend the network to a total length of 925 meters (about 3035 feet).none of these4 repeaters5 repeaters2 repeaters3 repeaters5-4-3 ruleThe thinnet 5-4-3 rule 5 segments, 4 repeaters, and 3 populated segments 15. Wi-Fi Wireless networks use _________ access method. request priority token(prenominal) BusCSMA/CACSMA/CDitem Ring16. Access methods prevent ____________ access to the media.preemptiveNone of th ese unwindrandomsimultaneous17. A quantity ethernet network can combine as many as ____________ cable segments touched by four repeaters, but notwithstanding three segments can have move attached.6none of these34518. A 10Base5 topology is also referred to as ____________.standard ethernet802.3Thicknetall of these19. Token passing is deterministic, meaning that a computer cannot force its way onto the network as it can in a ______ environmentCSMA/CDPolling look at priorityCSMA/CASwitching20. Which type of network media-access method do IBM LANs with Multistation Access Units pursue?CSMA/CA.CSMA/CDBeaconingToken passing.None of these21. The trailer of a packet contains the destination addressFalse uncoiled22. In the IBM implementation of Token Ring, a star-wired ring, the veridical physical ring of cable is in the ________.MSAUall of thesenone of thesehubRepeater23. When using the CSMA/CA access method, a computer waits until the network is quiet and thus transports its data. If two computers transmit at the same time, the data will collide and have to be re-sent. If two data packets collide, both will be destroyed.False. true(p)24. Ethernet relies on the ____________ access method to regulate traffic on the main cable segmentCSMA/CACSMA/CDall of theseToken RingDemand Priority25. MSAUs were designed to sense when a ________ fails and to gulf from it.HubCableNICNetworkComputer CPU26. Which access method is used, when each computer communicates besides with a hub. The hub then controls the flow of data a. CSMA/CDb. CSMA/CA.c. Token Bus.d. Token Ringe. Demand priorityc onlya onlyboth c and de onlyb onlyd only27. With data masses divided into _______, unmarried transmissions occur more than frequently so that every computer on the network has more opportunities to transmit and receive data.bitsmessagesframes or packetsfilesbytes28. In a packet, the header usually contains an error-checking component called a CRC neatFalse29. Which access methods is used , when each computer mustiness wait to receive a token sooner it can transmit data. Only one computer at a time can use the token. a. CSMA/CDb. CSMA/CA.c. Token Bus.d. Token Ringe. Demand priorityboth c and dc onlye onlyd onlyboth a and b30. A Token Ring network is an implementation of IEEE standard ____________.802.4802.2802.11802.5802.331. Which of the following network access methods sends a signal indicating its intent to transmit data on the wire? Choose the opera hat answerCSMA/CDToken passing.BeaconingCSMA/CA.None of these32. If you must configure a network for three mission-critical servers and want to provide a highly fault-tolerant cabling scheme, which topology would you implement? Choose the best answerStar.Bus.MeshNone of theseRing.33. With the token-passing access method, only one computer at a time can use the token therefore, there are no _______.broadcastingscontentionscollisionsall of thesecollisions and contentions34. A packet (frame) components are separate into sections _________.CRCdataheaderall of thesetrailer35. When an IBM Token Ring network is full, adding another ____________ can elaborate the networkMSAUall of theserepeaterHub36. With CSMA/CD, if there is data on the cable, no other computer whitethorn ____________ until the data has reached its destination and the cable is clear once againtransmit and receivenone of thesereceivetransmit37. With more traffic on a CSMA/CD network, ____________ tend to increase, slowing the network downbroadcastingall of thesetransmissionscollisionsunicasting38. Fast Ethernet is another name for the ____________ topology100BaseXall of these100BaseFX100BaseT4100BaseT39. The 10BaseT topology is an Ethernet network that uses _________ cable to connect stationsCoaxialUTP and STPSTPUTP fictitious character40. Packets (Frames) may contain session-control codes, such as error correction, that indicate the need for a ______.unicastrecall stopover transmissionretransmissionbroadcast41. Your network is e xperiencing heavy traffic and signal attenuation due to long cable distances between computers.Required ResultCorrect the signal attenuation problem.Optional Desired ResultsReduce the broadcast traffic that is present on your network. Filter the network traffic to reduce the number of frames transferred across the network. Proposed SolutionInstall repeaters between distant segments. Which results does the proposed solution produce?The proposed solution produces the required result and produces both of the optional desired results. None of theseThe proposed solution does not produce the required result.The proposed solution produces the required result but does not produce any of the optional desired results.. The proposed solution produces the required result and produces only one of the optional desired results. Check with professor42. Which of the following is most likely the problem if the run system is unable to detect the network card? (Choose the best answer)Wrong frame type is set on the network cardWrong IRQ is set on the network cardWrong IRQ is set on the IDE controller cardWrong protocol is bound to the network adapter43. Wireless networks use _______ topologymeshall of thesestarbusring44. In the demand-priority access method, transmissions are not ____________ to all other computers on the networkmulticastroutedunicastall of thesebroadcast45. When a frame returns to its sending computer, that computer ____________ the frame and puts a new token back on the ring.copieswritesreadsremovesnone of these46. Every network port wine card sees all packets sent on its segment, but it interrupts the computer only if the packet address matches its individual addressTrueFalse47. Typically, Ethernet is a baseband computer architecture that uses a _________topologyall of thesestarmeshbusring48. The maximum length of a 10BaseT segment is ____________ meters1381000500250100

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.