Ring networks use the ________ method to avoid data collisions
A) packet screening B) token C) active-check D) passive-check
B
Computer Science & Information Technology
A) packet screening B) token C) active-check D) passive-check
B