Question
a.
FDDI
b.
Token Ring
c.
Thin Ethernet
d.
lOBase T
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. In which of the following cable systems are T connectors and terminators are used?
Similar Questions
Discover Related MCQs
Q. An ethernet switch works at the protocol layer
View solution
Q. You want to keep an individual from logging on to a Windows NT Server computer by using the default Administrator account. How should you do this?
View solution
Q. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?
View solution
Q. Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments
View solution
Q. What does the Directory Replicator service allow you to do?
View solution
Q. A route is a path between two network segments
View solution
Q. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols
View solution
Q. Fibre Optic cable is often used to
View solution
Q. Workstations connected to a port on a modern lOBase-T Ethernet HUB all use the same bandwidth, i.e. the bandwidth is shared across all available ports, the less ports, the less bandwidth available per port
View solution
Q. You want to install a new internal CD-ROM drive. You must first confirm that there will be no IRQ conflicts. How should you do this?
View solution
Q. A cut-through switch reads the entire packet before forwarding it to the destination segment
View solution
Q. A Trust Relationship
View solution
Q. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and-you have limited work space. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?
View solution
Q. User Manager for domains
View solution
Q. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?
View solution
Q. The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?
View solution
Q. Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration"?
View solution
Q. As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from
View solution
Q. With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports
View solution
Q. What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!