The two most common network access methods are ____ and token ring.

A. Ethernet
B. bus
C. star
D. peer-to-peer


Answer: A

Computer Science & Information Technology

You might also like to view...

A string concatenation operation evaluates to null if all of the input columns have a value.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is often used for headlines and titles?

A) A nameplate B) A screenshot C) A watermark D) Small caps font effect

Computer Science & Information Technology

In a rollover, the two graphics must be the same ____.

A. format B. file size C. size D. transparency

Computer Science & Information Technology

Character data types are ____ converted to integers in an expression.

A. always B. sometimes C. usually D. never

Computer Science & Information Technology