Match each item with a statement below:

A. device that uses MAC addresses to determine the destination of frame
B. device that connects multiple computers but regenerates signals out all ports
C. communication in which a device can send and receive signals but not at the same time
D. device that connects LANs
E. how devices connected to a hub use network bandwidth
F. device that only regenerates incoming signals
G. how devices connected to a switch use network bandwidth
H. device that connects a computer with the network medium
I. device that connects wireless computers
J. amount of data that can be transferred on a network


A. switch
B. hub
C. half-duplex mode
D. router
E. bandwidth sharing
F. repeater
G. dedicated bandwidth
H. network interface card
I. access point
J. network bandwidth

Computer Science & Information Technology

You might also like to view...

Consider the process of ordering a book via Internet. Draw an activity diagram representing each step of the process, from the moment you open the shop’s web page to the point when you start reading the book, including login or registration. Include activities that others need to perform.

Add additional exception handling to the activity diagram you have developed. Model the following three exceptions: 1. The order got lost in the Internet 2. The wrong book is packaged 3. The ordered book is no longer available

Computer Science & Information Technology

Which of the following statements are true?

a. Inner classes can make programs simple and concise. b. An inner class can be declared public or private subject to the same visibility rules applied to a member of the class. c. An inner class can be declared static. A static inner class can be accessed using the outer class name. A static inner class cannot access nonstatic members of the outer class. d. An inner class supports the work of its containing outer class and is compiled into a class named OuterClassName$InnerClassName.class.

Computer Science & Information Technology

Analyze the following code.

I:``` public class Test { public static void main(String[] args) { System.out.println("Welcome to Java!"); } } ``` II: ``` public class Test { public static void main(String[] args) { System.out.println("Welcome to Java!"); } } ``` a. Both I and II can compile and run and display Welcome to Java, but the code in II has a better style than I. b. Only the code in I can compile and run and display Welcome to Java. c. Only the code in II can compile and run and display Welcome to Java. d. Both I and II can compile and run and display Welcome to Java, but the code in I has a better style than II.

Computer Science & Information Technology

For what reasons would you want to open an Access database with exclusive rights?

What will be an ideal response?

Computer Science & Information Technology