{{Only answer not explain }} 1. A connection that provides a dedicated link between two devices is known as   connection. a) primary    b) multipoint      c) point-to-point      d) secondary   2. To accomplish flow control, TCP uses a ___________ window protocol. a) limited-size    b) sliding      c) fixed-size    d) none   3. A _______ is a data communication system within a building, plant, or campus, or between nearby buildings. a) LAN    b) MAN c) WAN d) none of the above   4. Communication between a computer and a keyboard involves ______________ transmission. a) simplex   b) half-duplex    c) full-duplex d) automatic   5. An unauthorized user is a network _______ issue. a) security   b) reliability   c) performance      d) all the above   6. 100Base-T4 uses ________ line coding. a) 8B6T    b) Manchester c) MLT-3    d) NRZ 7. The most widely used local area network protocol is   . a)   Token Bus      b)   Ethernet c)   Token Ring d)   none of the above 8. 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. a) 8B/10B; NRZ    b) 4B/5B; NRZ c) 8B/10B; MLT-3    d) 4B/5B; MLT-3 9. In Ethernet addressing, if all the bits are 1s, the address is _________. a) multicast    b) broadcast      c) unicast   d) none of the above   10. Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC). a) 48-bit    b) 32-bit c) 5-byte    d) none of the above   11. The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing. a) MAC b) MII c) LLC d) ADG 12. In IPv6, the _______ field in the base header restricts the lifetime of a datagram. a) version b) next-header c) hop limit d) neighbor-advertisement

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter9: Computer Networks
Section: Chapter Questions
Problem 9VE
icon
Related questions
Question

{{Only answer not explain }}

1. A connection that provides a dedicated link between two devices is known as   connection.

a) primary   

b) multipoint     

c) point-to-point     

d) secondary

 

2. To accomplish flow control, TCP uses a ___________ window protocol.

a) limited-size   

b) sliding     

c) fixed-size   

d) none

 

3. A _______ is a data communication system within a building, plant, or campus, or between nearby buildings.

a) LAN   

b) MAN

c) WAN

d) none of the above

 

4. Communication between a computer and a keyboard involves ______________ transmission.

a) simplex  

b) half-duplex   

c) full-duplex

d) automatic

 

5. An unauthorized user is a network _______ issue.

a) security  

b) reliability  

c) performance     

d) all the above

 

6. 100Base-T4 uses ________ line coding.

a) 8B6T   

b) Manchester

c) MLT-3   

d) NRZ

7. The most widely used local area network protocol is   .

a)   Token Bus     

b)   Ethernet

c)   Token Ring

d)   none of the above

8. 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding.

a) 8B/10B; NRZ   

b) 4B/5B; NRZ

c) 8B/10B; MLT-3   

d) 4B/5B; MLT-3

9. In Ethernet addressing, if all the bits are 1s, the address is _________.

a) multicast   

b) broadcast     

c) unicast  

d) none of the above

 

10. Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC).

a) 48-bit   

b) 32-bit

c) 5-byte   

d) none of the above

 

11. The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.

a) MAC

b) MII

c) LLC

d) ADG

12. In IPv6, the _______ field in the base header restricts the lifetime of a datagram.

a) version

b) next-header

c) hop limit

d) neighbor-advertisement

Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Types of Protocols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning