Ring networks use the ________ method to avoid data collisions

A) packet screening B) token C) active-check D) passive-check

B

Computer Science & Information Technology

You might also like to view...

Arrays are allocated with the keyword .

a) new b) array c) table d) None of the above.

Computer Science & Information Technology

Which of the following is not a common search operator?

A. ? B. | C. + D. -

Computer Science & Information Technology