Saturday, March 2, 2019

Quiz 3 Questions and Answers Essay

1. You are inst lone(prenominal)ing a interlock plank in a computer that has several devices configured. There is a correspondent on LPT 1, a mouse on COM 1, a modem on COM 2, and a SCSI host adapter occupying IRQ 10. The computer alike has a overweight twit using IRQ5. If your internet card supports IRQs 3 through 5 and 9 through 11, which of the following IRQs could you assemble it for in this computer?IRQ7IRQ3IRQ10n oneness of theseIRQ4IRQ52. A 100BaseVG meshwork is build on a ______ topology with alone computers withdrawed to a hubringmesh altogether of these friend muckle3. Your network is experiencing heavy barter and indicate fading due to bulky cable distances between computers.Required leave aloneCorrect the repoint attenuation job.Optional Desired ResultsReduce the disseminate trading that is present on your network. Filter the network traffic to rivet the number of framing ins transferred across the network.Proposed resolutenessInst alone repeate rs between inappropriate segments. Install routers and configure them to filter commit traffic. Which results does the proposed ascendant gain?The proposed solution produces the required result but does non produce any of the nonobligatory want results.. The proposed solution produces therequired result and produces only one of the optional desired results.. The proposed solution does not produce the required result.The proposed solution produces the required result and produces both of the optional desired results.None of these4. In a item Ring frame the ______ subject area indicates whether the frame is a token frame or a selective information frame.none of theseAccess Controlerror checking anterioritymedia typeface5. Cables attach the individual clients and serves to the MSAU that works like other ____________ hubsswitchactivepassive voicebridgenone of these6. A token is a special type of ____________ that circulates around a cable ring info transmissionframe or packete lectrical signalsnone of theseserial signals7. Managing info on a network depends on traffic control. The set of rules that governs how network traffic is controlled is calledChannelsLayersInterfaceDrivers.Access Methods.8. You are considering starting a raising company that provides on-site classroom instruction to various businesses. Your service bequeath include a temporary networked classroom environment. Assuming that the facilities do not have pre-installed wiring and that the classroom allow for use 10 or less computers, which topology would require the least equipment and be the easiest to set up and tear down. Choose the topper answerStar.All of theseRing.MeshBus.9. With the demand-priority penetration system, the ____________ manage network access by doing round-robin searches for requests to send from all nodes.none of theseusersroutersgatewayshubs10. CSMA/CD is know as a ____________ access method because computers on the network struggle for an opportunity to sen d informationpolingparallelcontentionsequentialpriority11. Ethernet can use several communication ____________ including TCP/IPprotocolsdata pathschannelsapplicationsmedia12. Typically, the hub of a 10BaseT network serves as a multiport ________.13. The 100BaseTX topology runs on UTP Category ________ data-grade cable5124314. Because single-segment 10Base2 Ethernet limits would be too confining for a large business, ____________ can be used to join Ethernet segments and ex extend the network to a total continuance of 925 meters (about 3035 feet).none of these4 repeaters5 repeaters2 repeaters3 repeaters5-4-3 ruleThe thinnet 5-4-3 rule 5 segments, 4 repeaters, and 3 populated segments 15. Wi-Fi Wireless networks use _________ access method.Demand priorityToken BusCSMA/CACSMA/CDToken Ring16. Access methods prevent ____________ access to the media.preemptiveNone of these lessenrandomsimultaneous17. A standard ethernet network can coincide as many as ____________ cable segments imput eed by quad repeaters, but only tierce segments can have stations attached.6none of these34518. A 10Base5 topology is also referred to as ____________.standard ethernet802.3Thicknetall of these19. Token passing is deterministic, meaning that a computer cannot force its way onto the network as it can in a ______ environmentCSMA/CDPollingDemand priorityCSMA/CA shift20. Which type of network media-access method do IBM LANs with Multistation Access Units employ?CSMA/CA.CSMA/CDBeaconingToken passing.None of these21. The trailer of a packet submits the ending cut acrossFalse aline22. In the IBM implementation of Token Ring, a star-wired ring, the genuine physical ring of cable is in the ________.MSAUall of thesenone of thesehub ventureslider23. When using the CSMA/CA access method, a computer waits until the network is legato and then transmits its data. If two computers transmit at the same time, the data leave alone collide and have to be re-sent. If two data packets collide, b oth will be destroyed.False.True24. Ethernet relies on the ____________ access method to regulate traffic on the main cable segmentCSMA/CACSMA/CDall of theseToken RingDemand Priority25. MSAUs were designed to sense when a ________ fails and to disconnect from it.HubCableNICNetworkComputer CPU26. Which access method is used, when each computer communicates only with a hub. The hub then controls the flow of data a. CSMA/CDb. CSMA/CA.c. Token Bus.d. Token Ringe. Demand priorityc onlya onlyboth c and de onlyb onlyd only27. With data deal divided into _______, individual transmissions occur more frequently so that each computer on the network has more opportunities to transmit and contract data.bitsmessagesframes or packetsfilesbytes28. In a packet, the header usually contains an error-checking component called a CRCTrueFalse29. Which access methods is used, when each computer must wait to amaze a token before it can transmit data. Only one computer at a time can use the token. a. CS MA/CDb. CSMA/CA.c. Token Bus.d. Token Ringe. Demand priorityboth c and dc onlye onlyd onlyboth a and b30. A Token Ring network is an implementation of IEEE standard ____________.802.4802.2802.11802.5802.331. Which of the following network access methods sends a signal indicating its intent to transmit data on the wire? Choose the vanquish answerCSMA/CDToken passing.BeaconingCSMA/CA.None of these32. If you must configure a network for three mission-critical servers and want to provide a highly fault-tolerant cabling scheme, which topology would you implement? Choose the best answerStar.Bus.MeshNone of theseRing.33. With the token-passing access method, only one computer at a time can use the token therefore, there are no _______.broadcastingscontentionscollisionsall of thesecollisions and contentions34. A packet (frame) components are grouped into sections _________.CRCdataheaderall of thesetrailer35. When an IBM Token Ring network is full, adding other ____________ can enlarge the networkMSAUall of theserepeaterHub36. With CSMA/CD, if there is data on the cable, no other computer may ____________ until the data has reached its destination and the cable is clear againtransmit and receivenone of thesereceivetransmit37. With more traffic on a CSMA/CD network, ____________ tend to increase, slowing the network downbroadcastingall of thesetransmissionscollisionsunicasting38. Fast Ethernet is some other name for the ____________ topology100BaseXall of these100BaseFX100BaseT4100BaseT39. The 10BaseT topology is an Ethernet network that uses _________ cable to connect stationsCoaxialUTP and STPSTPUTPFiber40. Packets (Frames) may contain session-control codes, such as error correction, that indicate the need for a ______.unicast repudiatestop transmissionretransmissionbroadcast41. Your network is experiencing heavy traffic and signal attenuation due to long cable distances between computers.Required ResultCorrect the signal attenuation problem.Optional Desired Result sReduce the broadcast traffic that is present on your network. Filter the network traffic to reduce the number of frames transferred across the network. Proposed SolutionInstall repeaters between distant segments. Which results does the proposed solution produce?The proposed solution produces the required result and produces both of the optional desired results. None of theseThe proposed solution does not produce the required result.The proposed solution produces the required result but does not produce any of the optional desired results.. The proposed solution produces the required result and produces only one of the optional desired results. Check with Prof42. Which of the following is most likely the problem if the operating system is unable to detect the network card? (Choose the best answer)Wrong frame type is set on the network cardWrong IRQ is set on the network cardWrong IRQ is set on the IDE controller cardWrong protocol is bound to the network adapter43. Wireless networks use _______ topologymeshall of thesestarbusring44. In the demand-priority access method, transmissions are not ____________ to all other computers on the networkmulticastroutedunicastall of thesebroadcast45. When a frame returns to its sending computer, that computer ____________ the frame and puts a new token back on the ring.copieswritesreadsremovesnone of these46. Every network interface card sees all packets sent on its segment, but it interrupts the computer only if the packet credit matches its individual addressTrueFalse47. Typically, Ethernet is a baseband architecture that uses a _________topologyall of thesestarmeshbusring48. The maximum length of a 10BaseT segment is ____________ meters1381000500250100

No comments:

Post a Comment