Token-ring networks, although logically viewed as rings, are connected using central ____.

A. media access units
B. multistation access units
C. station access units
D. access units


Answer: B

Computer Science & Information Technology

You might also like to view...

Establishing a contact number of hot line is an aspect of ____ planning.

A. business continuity B. incident response C. attack D. crisis management

Computer Science & Information Technology

The logic_error and runtime_error classes are defined in the header file ____.

A. stdex B. stdlib C. stdexcept D. exception

Computer Science & Information Technology

What processor instruction set is required in order to utilize virtualization software??

A. ?AMD-VT B. ?Intel VirtualBit C. ?Virtual Machine Extensions (VMX) D. ?Virtual Hardware Extensions (VHX)

Computer Science & Information Technology

A(n) ____ is a group of commands presented in a list.

A. action list B. input box C. menu D. status bar

Computer Science & Information Technology