A logical bus topology

a. is always used by token ring protocol LANs
b. has all computers connected to each other in point-to-point connections
c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology
d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers
e. has a central control device, such as a mainframe


Ans: d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers

Computer Science & Information Technology

You might also like to view...

Which of the following is the newest and strongest Windows hash?

A. LANMAN B. NTLM C. NTLM2 D. NTLM3

Computer Science & Information Technology

?____ is the gathering and use of the browsing habits of potential and current customers, which is important data for many companies.

A. ?Micro-marketing B. ?E-retailing C. ?VoIP D. ?EDI

Computer Science & Information Technology

Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.

a. Distributed denial-of-service b. Smishing c. Logic bomb d. Phishing

Computer Science & Information Technology

____ is an e-retailer's process for packaging and shipping products.

A. Value-added networking B. Managed hosting C. Order fulfillment D. Dedicated hosting

Computer Science & Information Technology