Question
a.
ALOHA
b.
Binary Count down
c.
CSMA/CD
d.
Multiple Access Protocol
Posted under Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The protocol used in ETHERNET?
Similar Questions
Discover Related MCQs
Q. In Token Ring, Which of the following is not a transceiver function ?
View solution
Q. The problem of a station not being able to detect a potential competitor for the medium because it thinks that there is activity between them is called .....................
View solution
Q. Protocols in which stations listen for a carrier and act accordingly are ..................
View solution
Q. LANs can be connected by a device called .................
View solution
Q. In .................... all frames are given to the computer, not to those addressed.
View solution
Q. .................. Algorithm is used in transparent bridges.
View solution
Q. FDDI is an acronym for ...............
View solution
Q. .................... bridge operates in promiscuous mode.
View solution
Q. Frames from one LAN can be transmitted to another LAN via the device
View solution
Q. Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer:
View solution
Q. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.
View solution
Q. How many hosts are attached to each of the local area networks at your site?
View solution
Q. Select the correct statement about broadband and baseband.
View solution
Q. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
View solution
Q. Devices interconnected by the LAN should include
View solution
Q. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
View solution
Q. Data are sent over pin _____ of the EIA-232 interface.
View solution
Q. Internet-like networks between a company and its business partners. Select the best fit for answer:
View solution
Q. Distributed Queue Dual Bus is a standard for
View solution
Q. Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!