6-43.
Which of the following network
access methods requires each
node to wait for permission to
transmit data?
1.
CSMA
2.
CSMA/CD
3.
Token passing
4.
Contention
6-44.
On a network that uses the
CSMA/CD access method, which of
the following actions, if any,
will be taken when a data
collision is detected?
1.
2.
3.
4.
The workstation will cease
transmission and wait until
the line is clear
The workstation will
continue to transmit data
The network server will
assign the next open time to
the workstation that
suffered the collision
No action is taken; the data
is lost
6-45. In a LAN using a token ring
topology, the interface and
protocols are defined by which
of the following IEEE
standards?
1.
IEEE 802
2.
IEEE 802.3
3.
IEEE 802.4
4.
IEEE 802.5
6-46.
Which of the following LAN
systems uses a token ring
topology and has a data
throughput of 4 Mbits and 16
Mbits per second?
1.
EtherNet
2.
STARLAN
3. ARCnet
4.
IBM Token Ring
A. Control kernel
B. Network interfaces
C. File systems
D. File extensions
Figure 6B.
IN ANSWERING QUESTIONS 6-46 THROUGH
6-49, SELECT FROM FIGURE 6B THE
NETWORK OPERATING SYSTEM COMPONENT
THAT PERFORMS THE FUNCTION DESCRIBED
IN THE QUESTION. NOT ALL ITEMS IN THE
LIST ARE USED.
6-47.
Provides low-level subnet
protocols and translation for
bridging hardware drivers with
the network operating system.
1. A
2. B
3. C
4. D
6-48.
Controls data organization,
storage, and retrieval on the
various storage systems
available to the network.
1. A
2. B
3. C
4. D
6-49.
The main subsystem of the
network operating software.
1. A
2. B
3. C
4. D
6-50.
Which of the following network
operating systems, if any, is
designed for very few users and
light usage?
1.
Full featured
2.
Low cost
3. Zero slot
4. None of the above
36