Communication between a computer and a keyboard involves ______________ transmission. a) simplex b) half-duplex c) full-duplex d) automatic An unauthorized user is a network _______ issue. a) security b) reliability c) performance d) all the above 100Base-T4 uses ________ line coding. a) 8B6T b) Manchester c) MLT-3 d) NRZ The most widely used local area network protocol is. a) Token Bus b) Ethernet c) Token Ring d) none of the above 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. a) 8B/10B; NRZ b) 4B/5B; NRZ c) 8B/10B; MLT-3 d) 4B/5B; MLT-3 In Ethernet addressing, if all the bits are 1s, the address is _________. a) multicast b) broadcast c) unicast d) none of the above Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC). a) 48-bit b) 32-bit c) 5-byte d) none of the above The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing. a) MAC b) MII c) LLC d) ADG In IPv6, the _______ field in the base header restricts the lifetime of a datagram. a) version b) next-header c) hop limit d) neighbor-advertisement
Communication between a computer and a keyboard involves ______________ transmission. a) simplex b) half-duplex c) full-duplex d) automatic An unauthorized user is a network _______ issue. a) security b) reliability c) performance d) all the above 100Base-T4 uses ________ line coding. a) 8B6T b) Manchester c) MLT-3 d) NRZ The most widely used local area network protocol is. a) Token Bus b) Ethernet c) Token Ring d) none of the above 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. a) 8B/10B; NRZ b) 4B/5B; NRZ c) 8B/10B; MLT-3 d) 4B/5B; MLT-3 In Ethernet addressing, if all the bits are 1s, the address is _________. a) multicast b) broadcast c) unicast d) none of the above Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC). a) 48-bit b) 32-bit c) 5-byte d) none of the above The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing. a) MAC b) MII c) LLC d) ADG In IPv6, the _______ field in the base header restricts the lifetime of a datagram. a) version b) next-header c) hop limit d) neighbor-advertisement
Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter9: Cybercrime And Information System Security
Section: Chapter Questions
Problem 2CE
Related questions
Question
- Communication between a computer and a keyboard involves ______________ transmission.
- a) simplex
- b) half-duplex
- c) full-duplex
- d) automatic
- An unauthorized user is a network _______ issue.
- a) security
- b) reliability
- c) performance
- d) all the above
- 100Base-T4 uses ________ line coding.
- a) 8B6T
- b) Manchester
- c) MLT-3
- d) NRZ
- The most widely used local area network protocol is.
- a) Token Bus
- b) Ethernet
- c) Token Ring
- d) none of the above
- 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding.
- a) 8B/10B; NRZ
- b) 4B/5B; NRZ
- c) 8B/10B; MLT-3
- d) 4B/5B; MLT-3
- In Ethernet addressing, if all the bits are 1s, the address is _________.
- a) multicast
- b) broadcast
- c) unicast
- d) none of the above
- Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC).
- a) 48-bit
- b) 32-bit
- c) 5-byte
- d) none of the above
- The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
- a) MAC
- b) MII
- c) LLC
- d) ADG
- In IPv6, the _______ field in the base header restricts the lifetime of a datagram.
- a) version
- b) next-header
- c) hop limit
- d) neighbor-advertisement
Expert Solution
Trending now
This is a popular solution!
Step by step
Solved in 10 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning