________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T.

a. Mullion Ethernet
b. Base-T Ethernet
c. 10/100 Ethernet
d. Token ring Ethernet
e. FDDI Ethernet


Answer: c. 10/100 Ethernet

Computer Science & Information Technology

You might also like to view...

____ are the networks that are either not known or cannot be identified.

A. Untrusted networks B. Trusted networks C. Partner networks D. Internal networks

Computer Science & Information Technology

A C-string is a sequence of characters stored in consecutive memory, terminated by a

A) period. B) space. C) null character. D) semicolon. E) None of the above

Computer Science & Information Technology

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

A. ?communications security  B. ?network security C. ?physical security D. ?information security

Computer Science & Information Technology

When an argument is passed ________ the called method can access and modify the caller’s original data directly.

a) either by value or by reference b) by value c) using keyword out d) using keyword ref e) Either c or d.

Computer Science & Information Technology