Communication between a computer and a keyboard involves ______________ transmission. a) simplex b) half-duplex c) full-duplex d) automatic An unauthorized user is a network _______ issue. a) security b) reliability c) performance d) all the above 100Base-T4 uses ________ line coding. a) 8B6T b) Manchester c) MLT-3 d) NRZ The most widely used local area network protocol is. a) Token Bus b) Ethernet c) Token Ring d) none of the above 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. a) 8B/10B; NRZ b) 4B/5B; NRZ c) 8B/10B; MLT-3 d) 4B/5B; MLT-3 In Ethernet addressing, if all the bits are 1s, the address is _________. a) multicast b) broadcast c) unicast d) none of the above Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC). a) 48-bit b) 32-bit c) 5-byte d) none of the above The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing. a) MAC b) MII c) LLC d) ADG In IPv6, the _______ field in the base header restricts the lifetime of a datagram. a) version b) next-header c) hop limit d) neighbor-advertisement
Communication between a computer and a keyboard involves ______________ transmission. a) simplex b) half-duplex c) full-duplex d) automatic An unauthorized user is a network _______ issue. a) security b) reliability c) performance d) all the above 100Base-T4 uses ________ line coding. a) 8B6T b) Manchester c) MLT-3 d) NRZ The most widely used local area network protocol is. a) Token Bus b) Ethernet c) Token Ring d) none of the above 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding. a) 8B/10B; NRZ b) 4B/5B; NRZ c) 8B/10B; MLT-3 d) 4B/5B; MLT-3 In Ethernet addressing, if all the bits are 1s, the address is _________. a) multicast b) broadcast c) unicast d) none of the above Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC). a) 48-bit b) 32-bit c) 5-byte d) none of the above The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing. a) MAC b) MII c) LLC d) ADG In IPv6, the _______ field in the base header restricts the lifetime of a datagram. a) version b) next-header c) hop limit d) neighbor-advertisement
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
- Communication between a computer and a keyboard involves ______________ transmission.
- a) simplex
- b) half-duplex
- c) full-duplex
- d) automatic
- An unauthorized user is a network _______ issue.
- a) security
- b) reliability
- c) performance
- d) all the above
- 100Base-T4 uses ________ line coding.
- a) 8B6T
- b) Manchester
- c) MLT-3
- d) NRZ
- The most widely used local area network protocol is.
- a) Token Bus
- b) Ethernet
- c) Token Ring
- d) none of the above
- 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line coding.
- a) 8B/10B; NRZ
- b) 4B/5B; NRZ
- c) 8B/10B; MLT-3
- d) 4B/5B; MLT-3
- In Ethernet addressing, if all the bits are 1s, the address is _________.
- a) multicast
- b) broadcast
- c) unicast
- d) none of the above
- Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC).
- a) 48-bit
- b) 32-bit
- c) 5-byte
- d) none of the above
- The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
- a) MAC
- b) MII
- c) LLC
- d) ADG
- In IPv6, the _______ field in the base header restricts the lifetime of a datagram.
- a) version
- b) next-header
- c) hop limit
- d) neighbor-advertisement
Expert Solution
Trending now
This is a popular solution!
Step by step
Solved in 10 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education