Token-ring networks, although logically viewed as rings, are connected using central ____.
A. media access units
B. multistation access units
C. station access units
D. access units
Answer: B
Computer Science & Information Technology
You might also like to view...
Establishing a contact number of hot line is an aspect of ____ planning.
A. business continuity B. incident response C. attack D. crisis management
Computer Science & Information Technology
The logic_error and runtime_error classes are defined in the header file ____.
A. stdex B. stdlib C. stdexcept D. exception
Computer Science & Information Technology
What processor instruction set is required in order to utilize virtualization software??
A. ?AMD-VT B. ?Intel VirtualBit C. ?Virtual Machine Extensions (VMX) D. ?Virtual Hardware Extensions (VHX)
Computer Science & Information Technology
A(n) ____ is a group of commands presented in a list.
A. action list B. input box C. menu D. status bar
Computer Science & Information Technology