单选题Both bus and tree topologies are characterized by the use of multipoint (1).For the bus, all stations attach, through appropriate hardware (2) known as a tap, directly to a linear transmission medium, or bus. Full-duplex operation between the station and the tap allows data to be transmitted onto the bus and received from the(3). A transmission from any station propagates the length of the medium in both directions and can be received by all other (4). At each end of the bus is a (5) , which absorbs any signal, removing it from the bus.空白(2)处应选择()AprocessingBswitchingCroutingDinterfacing

单选题
Both bus and tree topologies are characterized by the use of multipoint (1).For the bus, all stations attach, through appropriate hardware (2) known as a tap, directly to a linear transmission medium, or bus. Full-duplex operation between the station and the tap allows data to be transmitted onto the bus and received from the(3). A transmission from any station propagates the length of the medium in both directions and can be received by all other (4). At each end of the bus is a (5) , which absorbs any signal, removing it from the bus. 空白(2)处应选择()
A

processing

B

switching

C

routing

D

interfacing


参考解析

解析: 总线型和树形拓扑结构都使用多点传输介质。对于总线来说,所有站点都通过被称为接头的硬件直接连接到线性传输介质或总线上。站和接头之间的操作允许数据发送到总线上,也可以从总线上接收数据。任何站点发送的数据都向总线两端传播,并可以被所有其他站点接收到。在总线的两端各有一个终接器,它接收并从总线上移去所有信号。

相关考题:

The metaphysical poets are characterized by their extensive use of conceit.() 此题为判断题(对,错)。

● Both bus and tree topologies are characterized by the use of multipoint (71). For the bus, all stations attach, through appropriate hardware(72)known as a tap, directly to a linear transmission medium, or bus. Full-duplex operation between the station and the tap allows data to be transmitted onto the bus and received from the (73). A transmission from any station propagates the length of the medium in both directions and can be received by all other (74).At each end of the bus is a (75) , which absorbs any signal, removing it from the bus.(71)A. mediumB. connectionC. tokenD. resource(72)A. processingB. switchingC. routingD. interfacing(73)A. treeB. busC. starD. ring(74)A. routersB. stationsC. serversD. switches(75)A. tapB. repeaterC. terminatorD. concentrator

Both bus and tree topologies are characterized by the use of multipoint().A.mediumB.connectionC.tokenD.resource

(ii) Comment briefly on the use of its own tree plantations as a source of raw materials by Our Timbers Ltd.(3 marks)

Both bus and tree topologies are characterized by the use of multipoint (71) .For the bus,all stations attach,through appropriate hardware (72) known as a tap,directly to a linear transmission medium,or bus.Full-duplex operation between the station and the tap allows data to be transmitted onto the bus and received from the (73) .A transmission from any station propagates the length of the medium in both directions and can be received by all other (74) .At each end of the bus is a (75) ,which absorbs any signal,removing it from the bus.(71)A.mediumB.connectionC.tokenD.resource

Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? () A.StarB.BusC.MeshD.Ring

In which of the following topologies could the failure of one machine cause the entire network tostop functioning?() A. MeshB. Token ringC. StarD. Spanning tree

Which of the following network topologies BEST describes a VPN? ()(Select TWO) A. Point to PointB. Point to MultipointC. VLAND. RingE. Bus

--Which of those electronic dictionaries do you like most? -- __________. They are both expensive and of little use.A.NoneB.NeitherC.AllD.Both

the following diagram is ( ) network topology structure. A.bus B.star C.ring D.tree

As the bus came round the corner, it ran()a big tree by the roadside.AintoBonCoverDup

–How long does the bus?-()About half an hour.A、spendB、takeC、use

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

hy you use Spanning-tree? Difference between PVST  MST.

You are designing the forest and domain structure to meet the business and technical requirements. Which structure should you use?()A、A single forest with one tree, and one domainB、A single forest with one tree two domainC、A single forest with two trees, each with a single domainD、Two forests, each with a single tree and a single domainE、Two forests, each with two trees, with a single domain in each tree

Which statement is true about Kompella-based and Martina-based VPNs?()A、Both use LDPB、Both use BGPC、Both require additional hardware.D、Both use a two-label stack for forwarding.

It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()A、IPSecB、IPSec with GREC、DMVPND、EZVPNE、all of the choices

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

Both bus and tree topologies are characterized by the use of multipoint (1).For the bus, all stations attach, through appropriate hardware (2) known as a tap, directly to a linear transmission medium, or bus. Full-duplex operation between the station and the tap allows data to be transmitted onto the bus and received from the(3). A transmission from any station propagates the length of the medium in both directions and can be received by all other (4). At each end of the bus is a (5) , which absorbs any signal, removing it from the bus.空白(1)处应选择()A、mediumB、connectionC、tokenD、resource

Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus

In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A、MeshB、Token ringC、StarD、Spanning tree

Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()A、StarB、BusC、MeshD、Ring

单选题It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()AIPSecBIPSec with GRECDMVPNDEZVPNEall of the choices

单选题You are designing the forest and domain structure to meet the business and technical requirements.   Which structure should you use?()A A single forest with one tree, and one domainB A single forest with one tree two domainC A single forest with two trees, each with a single domainD Two forests, each with a single tree and a single domainE Two forests, each with two trees, with a single domain in each tree.

单选题You are designing the forest and domain structure to meet the business and technical requirements. Which structure should you use?()AA single forest with one tree, and one domainBA single forest with one tree two domainCA single forest with two trees, each with a single domainDTwo forests, each with a single tree and a single domainETwo forests, each with two trees, with a single domain in each tree

单选题As the bus came round the corner, it ran()a big tree by the roadside.AintoBonCoverDup

问答题hy you use Spanning-tree? Difference between PVST  MST.

多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard