Question
a.
True
b.
False.
c.
May be
d.
Can't say
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols
Similar Questions
Discover Related MCQs
Q. Fibre Optic cable is often used to
View solution
Q. Workstations connected to a port on a modern lOBase-T Ethernet HUB all use the same bandwidth, i.e. the bandwidth is shared across all available ports, the less ports, the less bandwidth available per port
View solution
Q. You want to install a new internal CD-ROM drive. You must first confirm that there will be no IRQ conflicts. How should you do this?
View solution
Q. A cut-through switch reads the entire packet before forwarding it to the destination segment
View solution
Q. A Trust Relationship
View solution
Q. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and-you have limited work space. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?
View solution
Q. User Manager for domains
View solution
Q. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?
View solution
Q. The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?
View solution
Q. Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration"?
View solution
Q. As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from
View solution
Q. With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports
View solution
Q. What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?
View solution
Q. Server Manager
View solution
Q. Bridges introduce small delays into a network.
View solution
Q. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment
View solution
Q. Your company uses both Ethernet and token-ring LAN's in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LAN's that use different protocols?
View solution
Q. Your 10Base2 Ethernet cable is 185 meters long. You are planning to extend your network by adding another 100 meters of cable. The total length of the cable will be 285 meters. The network uses NetBEUI. Which device should you use?
View solution
Q. Each network segment must have a unique address
View solution
Q. You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!