Racunarske Mreze 12. Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Nebojsa
N
Nebojsa
Community Contributor
Quizzes Created: 1 | Total Attempts: 775
Questions: 65 | Attempts: 775

SettingsSettingsSettings
Racunarske Mreze 12. Test - Quiz

VISER


Questions and Answers
  • 1. 

    Koji od iskaza su tacni za  podsloj LLC?

    • A.

      Opisani su standardom IEEE 802.1

    • B.

      Protokol je za upravljanje logickom vezom

    • C.

      Postavljen iznad IEEE 802.3 protokola

    • D.

      Format, interfejs i protokol zasnovani su na HDLC protokolu

    • E.

      Opisani su standardom IEEE 802.2

    • F.

      Skracenica je od Logical Link Control

    • G.

      Postavljen ispod IEEE 802.4 protokola

    • H.

      Skracenica je od Link Level Control

    Correct Answer(s)
    B. Protokol je za upravljanje logickom vezom
    C. Postavljen iznad IEEE 802.3 protokola
    D. Format, interfejs i protokol zasnovani su na HDLC protokolu
    E. Opisani su standardom IEEE 802.2
    F. Skracenica je od Logical Link Control
    Explanation
    The correct answer options provide accurate statements about the LLC sublayer. It is a protocol for managing the logical link, it is placed above the IEEE 802.3 protocol, its format, interface, and protocol are based on HDLC, it is described by the IEEE 802.2 standard, and its abbreviation is Logical Link Control.

    Rate this question:

  • 2. 

    Na slici je prikazana

    • A.

      Logicka topologija jedan ka svima

    • B.

      Sekvencijalna logicka topologija

    • C.

      Mes logicka topologija

    • D.

      Logicka topologija zvezde

    Correct Answer
    A. Logicka topologija jedan ka svima
    Explanation
    The correct answer is "Logicka topologija jedan ka svima" which translates to "Logical topology one to all" in English. This suggests that the image is depicting a logical network topology where there is a single central node that is connected to all other nodes in the network. This type of topology is commonly referred to as a "star topology" in networking.

    Rate this question:

  • 3. 

    Na slici je prikazana fizicka topologija 

    • A.

      Zvezde

    • B.

      Magistrale

    • C.

      Prosirene zvezde

    • D.

      Prstena

    Correct Answer
    D. Prstena
    Explanation
    The correct answer is "Prstena" because the image shows a physical topology where the nodes are connected in a ring or circular fashion. In a ring topology, each node is connected to exactly two other nodes, creating a closed loop. This type of topology is commonly used in local area networks (LANs) and allows for efficient data transmission as each node has equal access to the network.

    Rate this question:

  • 4. 

    Prenosni medijum sa frekvencijskim multipleksom za N korisnika

    • A.

      Se ne deli, vec se korisniku dodeljuje citav kanal

    • B.

      Se deli na N+1 jednakih delova

    • C.

      Se deli na N-1 jednakih delova

    • D.

      Se deli na N jednakih delova

    Correct Answer
    D. Se deli na N jednakih delova
    Explanation
    The correct answer is "Se deli na N jednakih delova" which means "It is divided into N equal parts". This suggests that the portable medium with frequency multiplexing is divided into N equal parts, each assigned to a different user. This allows multiple users to share the medium simultaneously without interfering with each other's signals.

    Rate this question:

  • 5. 

    Metod CSMA/CD

    • A.

      Pripada podsloju za pristup transmisionom medijumu

    • B.

      Pripada fizickom sloju

    • C.

      Pripada LLC podsloju

    • D.

      Pripada mreznom sloju

    Correct Answer
    A. Pripada podsloju za pristup transmisionom medijumu
    Explanation
    The correct answer is "Pripada podsloju za pristup transmisionom medijumu" because the CSMA/CD method is a protocol used in Ethernet networks to control access to the transmission medium. It stands for Carrier Sense Multiple Access with Collision Detection and is responsible for detecting collisions on the network and taking appropriate actions to avoid them. This function is part of the access control sublayer, which is responsible for managing the transmission of data over the network medium.

    Rate this question:

  • 6. 

    Kod Eternet lokalnih racunarskih mreza na MAC podsloju je protokol

    • A.

      CSMA/CD

    • B.

      Token Ring

    • C.

      Token Pass

    • D.

      CSMA/CA

    Correct Answer
    A. CSMA/CD
    Explanation
    CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is the correct answer. This protocol is used in Ethernet local area networks on the MAC (Media Access Control) sublayer. It allows multiple devices to share the same communication medium by sensing if it is busy before transmitting data and detecting collisions if they occur. When a collision is detected, the devices involved wait for a random amount of time before retransmitting their data. This protocol helps to ensure that network transmissions are efficient and reliable.

    Rate this question:

  • 7. 

    Vreme ranjavanja je jednako

    • A.

      Cetvorostrukom vremenu propagacije izmedju dve najudaljenije stanice

    • B.

      Minimalnom vremenu propagacije izmedju dve najudaljenije stanice

    • C.

      Dvostrukom vremenu propagacije izmedju dve najudaljenije stanice

    • D.

      Maksimalnom vremenu propagacije (prostiranja) izmedju najudaljenijih stanica

    Correct Answer
    D. Maksimalnom vremenu propagacije (prostiranja) izmedju najudaljenijih stanica
    Explanation
    The answer "Maksimalnom vremenu propagacije (prostiranja) izmedju najudaljenijih stanica" suggests that the time of injury is equal to the maximum time it takes for a signal to propagate between the furthest stations. This means that the injury occurs when the signal has traveled the longest distance and taken the longest time to reach its destination.

    Rate this question:

  • 8. 

    Staticko dodeljivanje kanala vezano je za sledece sisteme

    • A.

      IEEE 802.5

    • B.

      IEEE 802.3

    • C.

      ALOHA

    • D.

      TDM

    Correct Answer
    D. TDM
    Explanation
    Static channel allocation is a method used in telecommunications systems, where channels are assigned to users in a fixed manner. TDM (Time Division Multiplexing) is a system that uses static channel allocation, where each user is assigned a specific time slot to transmit their data. In TDM, the available bandwidth is divided into fixed time slots, and each user is allocated a dedicated slot for their communication. This ensures that each user gets a guaranteed amount of bandwidth and prevents collisions or conflicts between users. Therefore, TDM is an example of a system that uses static channel allocation.

    Rate this question:

  • 9. 

    Na slici je prikazana fizicka topologija

    • A.

      Magistrale

    • B.

      Prstena

    • C.

      Zvezde

    • D.

      Prosirene zvezde

    Correct Answer
    A. Magistrale
    Explanation
    The correct answer is "Magistrale" because the question states that the image represents a physical topology, and "Magistrale" is a type of physical topology that consists of a main backbone or highway connecting multiple devices in a linear manner. This type of topology is commonly used in bus networks where all devices are connected to a single communication line.

    Rate this question:

  • 10. 

    Kako se naziva vremenski interval u kome moze da dodje do kolizije izmedju dve stanic

    • A.

      Vreme ranjavanja

    • B.

      Vreme kolizije

    • C.

      Vreme distribucije

    • D.

      Vreme propagacije

    Correct Answer
    A. Vreme ranjavanja
  • 11. 

    Kod kog metoda za pristup transmisionom medijumu primenjen je sledeci princip. Kada stanica zeli da salje podatak ona prvo proverava da li je neka druga stanica vec zauzela transmisioni medijum

    • A.

      ALOHA

    • B.

      CSMA

    • C.

      TDM

    • D.

      FDM

    Correct Answer
    B. CSMA
    Explanation
    CSMA (Carrier Sense Multiple Access) is the correct answer. CSMA is a method used to access the transmission medium in which a station first checks if another station is already using the medium before transmitting data. If the medium is not busy, the station can proceed with sending the data. This principle helps to avoid collisions and ensures that multiple stations can share the same medium efficiently.

    Rate this question:

  • 12. 

    Kod bezicnih lokalnih racunarskih mreza stanice:

    • A.

      Mogu istovremeno i da salju i da primaju podatke

    • B.

      Mogu ili da salju ili da primaju podatke

    • C.

      Mogu samo da primaju podatke, nemaju mogucnost slanja

    • D.

      Mogu samo da salju podatke, nemaju mogucnost prijema

    Correct Answer
    B. Mogu ili da salju ili da primaju podatke
    Explanation
    The correct answer states that wireless local computer network stations can either send or receive data. This means that these stations have the capability to perform both functions simultaneously. They can send data to other devices on the network or receive data from other devices. This flexibility allows for efficient communication and data transfer within the network.

    Rate this question:

  • 13. 

    Na slici je prikazana

    • A.

      Logicka topologija jedan ka svima

    • B.

      Sekvencijalna logicka topologija

    • C.

      Mes logicka topologija

    • D.

      Logicka topologija zvezde

    Correct Answer
    B. Sekvencijalna logicka topologija
  • 14. 

    CSMA/CD je protokol koji obezbedjuje da svaka stanica

    • A.

      Dobije pristup transmisionom medijumu preko zetona

    • B.

      Sama se izbori za pristup transmisionom medijumu ispitujuci kada je on slobodan

    • C.

      Dobije pravo pristupa transmisionom medijumu u okviru jedne vremenske celine (slota)

    • D.

      Dobije pravo pristupa transmisionom medijumu u okviru jednog frekvencijskog kanala

    Correct Answer
    B. Sama se izbori za pristup transmisionom medijumu ispitujuci kada je on slobodan
    Explanation
    The correct answer is "Sama se izbori za pristup transmisionom medijumu ispitujuci kada je on slobodan." This means that CSMA/CD protocol allows each station to contend for access to the transmission medium by checking if it is free before transmitting. This ensures that multiple stations do not transmit simultaneously, which could result in collisions and data loss.

    Rate this question:

  • 15. 

    Logicka topologija lokalne racunarske mreze je

    • A.

      Metodologija pristupa transmisionom medijumu

    • B.

      Metedologija prosledjivanja poruke

    • C.

      Metodologija izracunavanja kasnjenja nakon kolizije

    • D.

      Metodologija izracunavanja najkrace putanje do odredisne stanice

    Correct Answer
    B. Metedologija prosledjivanja poruke
    Explanation
    The correct answer is "Metodologija prosledjivanja poruke" (Methodology of message forwarding). This is because logical topology refers to the way in which devices are connected and communicate in a network. In the case of a local computer network, the methodology of message forwarding determines how messages are transmitted and delivered between devices within the network.

    Rate this question:

  • 16. 

    CSMA je skracenica

    • A.

      Carrier Solid Multipath Access

    • B.

      Carrier Solid Multiple Access

    • C.

      Carrier Sence Multipath Access

    • D.

      Carrier Sence Multiple Access

    Correct Answer
    D. Carrier Sence Multiple Access
    Explanation
    CSMA stands for Carrier Sense Multiple Access. This is a protocol used in computer networks to manage the sharing of a communication channel. In CSMA, devices listen to the channel before transmitting data to check if it is idle or being used by another device. If the channel is busy, the device waits for a random amount of time before trying again. This helps to avoid collisions and ensure efficient use of the channel. Therefore, the correct answer is Carrier Sence Multiple Access.

    Rate this question:

  • 17. 

    Na slici je prikazana fizicka topologija

    • A.

      Zvezde

    • B.

      Magistrale

    • C.

      Prstena

    • D.

      Prosirene zvezde

    Correct Answer
    A. Zvezde
    Explanation
    The correct answer is "Zvezde" because the question states that the physical topology is shown in the picture. "Zvezde" refers to a star topology, which is a network configuration where all devices are connected to a central hub or switch. This can be inferred from the options given, as "Magistrale" refers to a bus topology, "Prstena" refers to a ring topology, and "Prosirene zvezde" refers to an extended star topology. Therefore, based on the given information, the correct answer is "Zvezde" or star topology.

    Rate this question:

  • 18. 

    IEEE 802.3an je standard Eternet lokalne racunarske mreze sa upredenim paricama brzine

    • A.

      10Gb/s

    • B.

      1Gb/s

    • C.

      100Mb/s

    • D.

      100Gb/s

    Correct Answer
    A. 10Gb/s
    Explanation
    The correct answer is 10Gb/s. IEEE 802.3an is a standard for Ethernet local area networks using twisted pair cables. It specifies a data transfer rate of 10 Gigabits per second (10Gb/s).

    Rate this question:

  • 19. 

    Podsloj LLC podrzava tri tipa usluga

    • A.

      Nepouzdanu bez uspostave veze

    • B.

      Bez uspostave veze i bez potvrde

    • C.

      Pouzdanu sa i bez uspostavu veze

    • D.

      Bez uspostavu veze sa potvrdom

    • E.

      Pouzdanu sa uspostavom veze

    • F.

      Nepouzdanu sa uspostavom veze

    Correct Answer(s)
    A. Nepouzdanu bez uspostave veze
    D. Bez uspostavu veze sa potvrdom
    E. Pouzdanu sa uspostavom veze
    Explanation
    The correct answer is a combination of three types of services supported by Podsloj LLC. The first type is "Nepouzdanu bez uspostave veze," which means an unreliable service without establishing a connection. The second type is "Bez uspostavu veze sa potvrdom," which means a service without establishing a connection but with confirmation. The third type is "Pouzdanu sa uspostavom veze," which means a reliable service with establishing a connection.

    Rate this question:

  • 20. 

    Gigabitni Eternet sa UTP kablovima kategorije 5 (1000 BaseT)

    • A.

      Koristi tehniku kodiranja 4D/PAM5

    • B.

      Koristi tehniku kodiranja 8B/10B

    • C.

      Koristi tehniku kodiranja WDMA

    • D.

      Koristi tehniku kodiranja CSMA

    Correct Answer
    A. Koristi tehniku kodiranja 4D/PAM5
    Explanation
    The correct answer is "Koristi tehniku kodiranja 4D/PAM5." This means that Gigabit Ethernet with UTP Category 5 cables uses the 4D/PAM5 coding technique. 4D/PAM5 is a coding technique that uses four-dimensional pulse amplitude modulation with five levels. This technique is used to encode and decode the signals transmitted over the Ethernet network, ensuring reliable and efficient communication at gigabit speeds.

    Rate this question:

  • 21. 

    Status rama kod IEEE 802.5 sadrzi

    • A.

      Bit koji ukazuje da je adresu odredisna stanica prepoznala kao svoju

    • B.

      Bit premasenja

    • C.

      Bit parnosti

    • D.

      Bit koji ukazuje da je ram uspesno iskopiran u memoriju odredisne stanice

    Correct Answer(s)
    A. Bit koji ukazuje da je adresu odredisna stanica prepoznala kao svoju
    D. Bit koji ukazuje da je ram uspesno iskopiran u memoriju odredisne stanice
    Explanation
    The correct answer is that the Status field in IEEE 802.5 contains a bit that indicates that the destination station has recognized the address as its own, and a bit that indicates that the frame has been successfully copied into the destination station's memory.

    Rate this question:

  • 22. 

    PoE tehnologija se koristi

    • A.

      Da bi se obezbedilo energetsko napajanje u Eternet mrezi, preko upredenih parica

    • B.

      Za detekciju gresaka

    • C.

      Za energetsko napajanje za IP telefone, pristupne tacke, WEB kamere

    • D.

      Za sinhronizaciju

    Correct Answer(s)
    A. Da bi se obezbedilo energetsko napajanje u Eternet mrezi, preko upredenih parica
    C. Za energetsko napajanje za IP telefone, pristupne tacke, WEB kamere
    Explanation
    PoE tehnologija se koristi za obezbeđivanje energetskog napajanja u Ethernet mreži preko upredenih parica. Takođe se koristi za energetsko napajanje IP telefona, pristupnih tačaka i WEB kamera.

    Rate this question:

  • 23. 

    Standard IEEE 802.3an odnosi se na

    • A.

      Bezicne lokalne racunarske mreze

    • B.

      Eternet racunarskemreze brzine 10Gb/s preko optickih vlakana

    • C.

      Eternet racunarskemreze brzine 10Gb/s preko koaksijalnih kablova

    • D.

      Eternet racunarskemreze brzine 10Gb/s preko upredenh parica

    Correct Answer
    D. Eternet racunarskemreze brzine 10Gb/s preko upredenh parica
    Explanation
    The correct answer is "Ethernet computer networks with a speed of 10Gb/s over twisted pair cables." This is because IEEE 802.3an is a standard that specifically refers to Ethernet networks with a speed of 10Gb/s, and it specifies the use of twisted pair cables for transmission.

    Rate this question:

  • 24. 

    Za FDDI racunarske mreze (fiber Distributed Data Interface, standard ANSI X3-T9) vazi sledece

    • A.

      Koriste upredene parice

    • B.

      Topologija je prosirene zvezde

    • C.

      Koriste Opticka vlakna

    • D.

      Protokol je IEEE 802.6

    • E.

      Topologijaje dvostruki prsten

    • F.

      Protokol je IEEE 802.5

    Correct Answer(s)
    C. Koriste Opticka vlakna
    E. Topologijaje dvostruki prsten
    F. Protokol je IEEE 802.5
    Explanation
    The correct answer is "Koriste Opticka vlakna, Topologijaje dvostruki prsten, Protokol je IEEE 802.5". This answer states that FDDI (Fiber Distributed Data Interface) networks use optical fibers, have a dual ring topology, and use the IEEE 802.5 protocol. This aligns with the information provided in the given statements.

    Rate this question:

  • 25. 

    U oznaci "10BaseF" slovo F ukazuje da je rec o mrezi

    • A.

      Sa FSK modulacijom

    • B.

      Sa frekvencijskim multipleksom

    • C.

      Sa optickim vlaknima

    • D.

      Sa faznim pomeranjem najveceg signala od 90 stepeni

    Correct Answer
    C. Sa optickim vlaknima
    Explanation
    The correct answer is "Sa optickim vlaknima" because the letter "F" in "10BaseF" stands for "fiber", indicating that it is a network that uses optical fibers for communication.

    Rate this question:

  • 26. 

    Za brzi Eternet vazi sledece

    • A.

      Oznaka je 100BaseT

    • B.

      Oznaka je 10BaseT

    • C.

      Oznaka standarda je IEEE 802.3u

    • D.

      Oznaka standarda je IEEE 802.5

    Correct Answer(s)
    A. Oznaka je 100BaseT
    C. Oznaka standarda je IEEE 802.3u
    Explanation
    The correct answer is "Oznaka je 100BaseT, Oznaka standarda je IEEE 802.3u." This is because the question is asking for the correct designation for fast Ethernet, and the correct designation is 100BaseT. Additionally, the correct standard for fast Ethernet is IEEE 802.3u.

    Rate this question:

  • 27. 

    Skracenica SSAP oznacava

    • A.

      Source Service Access Point

    • B.

      Switch Subnet Access Point

    • C.

      System Subnet Access Point

    • D.

      Source Subnet Access Point

    Correct Answer
    A. Source Service Access Point
    Explanation
    The correct answer is Source Service Access Point. SSAP stands for Source Service Access Point, which is a term used in computer networking to refer to the address of a specific service on a network. It is used to identify the source of a service request and establish communication between different network layers.

    Rate this question:

  • 28. 

    Standard IEEE 802.3an odnosi se na

    • A.

      Bezicne lokalne racunarske mreze

    • B.

      Eternet racunarske mreze brzine 10Gb/s preko optickih vlakana

    • C.

      Eternet racunarske mreze brzine 10Gb/s preko koaksijalnih kablva

    • D.

      Eternet racunarske mreze brzine 10Gb/s preko upredenih parica

    Correct Answer
    D. Eternet racunarske mreze brzine 10Gb/s preko upredenih parica
    Explanation
    The correct answer is Ethernet computer networks with a speed of 10Gb/s over twisted pair cables.

    Rate this question:

  • 29. 

    Status ramaIEEE 802.5 sadrzi

    • A.

      Bit koji ukazuje da je adresu odredisna stanica prepoznala kao svoju

    • B.

      Bit promasenja

    • C.

      Bit parnosti

    • D.

      Bit koji ukazuje da je ram uspesno iskopiran u memoriju odredisne stanice

    Correct Answer(s)
    A. Bit koji ukazuje da je adresu odredisna stanica prepoznala kao svoju
    D. Bit koji ukazuje da je ram uspesno iskopiran u memoriju odredisne stanice
    Explanation
    The correct answer is "Bit koji ukazuje da je adresu odredišna stanica prepoznala kao svoju" and "Bit koji ukazuje da je RAM uspešno iskopiran u memoriju odredišne stanice". In the IEEE 802.5 standard, the status field contains bits that provide information about the transmission status. The first bit indicates whether the destination address has been recognized by the receiving station, confirming that it is the intended recipient. The second bit indicates whether the RAM has been successfully copied into the memory of the destination station, ensuring successful transmission.

    Rate this question:

  • 30. 

    Od cega potice skracenica DTR u racunarskim mrezama

    • A.

      Dedicated Token Ring

    • B.

      Data Terminal Ready

    • C.

      Data Transmission Ready

    • D.

      Data Transmission Redistribute

    Correct Answer
    A. Dedicated Token Ring
    Explanation
    The correct answer is "Dedicated Token Ring". In computer networks, the acronym DTR stands for Dedicated Token Ring. This refers to a type of network topology where computers are connected in a ring formation, and a dedicated token is passed around the network to control access to the shared communication medium. This ensures that only one device can transmit data at a time, preventing collisions and ensuring efficient communication.

    Rate this question:

  • 31. 

    Kod standarda IEEE802.5

    • A.

      Polje RIF se koristi kod mostova sa odredisnim rutiranjem

    • B.

      Polje RIF se koristi kod mostova sa rutiranjem sa algoritmom stanja veze

    • C.

      Polje RIF se koristi kod mostova sa izvorisnim rutiranjem

    • D.

      Polje RIF se koristi kod mostova sa rutiranjem sa algoritmom vektora udaljenosti

    Correct Answer
    C. Polje RIF se koristi kod mostova sa izvorisnim rutiranjem
    Explanation
    The correct answer states that the RIF field is used in bridges with source routing. This means that the RIF field is used to specify the complete path that a frame should take through the network, starting from the source. This is in contrast to destination routing, where the path is determined by the network itself based on the destination address.

    Rate this question:

  • 32. 

    Topologija - prsten sa zetonom, koristi se za

    • A.

      Mreze sireg geografskog podrucja

    • B.

      Personalne mreze

    • C.

      Pozicioniranje medjustanica

    • D.

      Lokalne racunarske i mreze gradskog podrucja

    Correct Answer
    D. Lokalne racunarske i mreze gradskog podrucja
    Explanation
    The given correct answer states that the pring topology with a token is used for local computer networks and metropolitan area networks. This means that this type of topology is suitable for connecting computers and devices within a small geographical area, such as a single building or a city. It allows for efficient communication and data transfer between the connected devices in the local area.

    Rate this question:

  • 33. 

    Skracenica DSAP oznacava

    • A.

      Distributed Service Access Point

    • B.

      Destination Subnet Access Point

    • C.

      Distributed Subnet Access Point

    • D.

      Destination Service Access Point

    Correct Answer
    D. Destination Service Access Point
    Explanation
    The correct answer is Destination Service Access Point. In computer networking, a Service Access Point (SAP) is a point of access to a specific network service. The Destination Service Access Point (DSAP) is used to identify the intended network service to which a frame or packet is being sent.

    Rate this question:

  • 34. 

    Da bi se uspostavila veza izmedju dve stanice u bezicnim mrezama pomocu MACA protokola, stanica inicijator treba da posalje signal koji se oznacava sa

    • A.

      MTS

    • B.

      CTS

    • C.

      RTS

    • D.

      ATS

    Correct Answer
    C. RTS
    Explanation
    In wireless networks, the MACA (Multiple Access with Collision Avoidance) protocol is used to establish a connection between two stations. The station that initiates the connection needs to send a Request to Send (RTS) signal. This signal is used to reserve the channel and inform other stations that a transmission is about to take place. Once the RTS signal is received by the intended station, it responds with a Clear to Send (CTS) signal, indicating that it is ready to receive the data. Therefore, the correct answer is RTS.

    Rate this question:

  • 35. 

    IEEE 802.3 koristi na MAC podsloju protokol

    • A.

      CSMA/CD

    • B.

      Token Ring

    • C.

      Token Pass

    • D.

      CSMA/CA

    Correct Answer
    A. CSMA/CD
    Explanation
    IEEE 802.3 is a standard that defines the Ethernet protocol at the MAC (Media Access Control) sublayer. CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is the protocol used by Ethernet to access the shared network medium. It allows devices to listen to the network before transmitting data and if a collision is detected, it aborts the transmission and waits for a random amount of time before reattempting. This protocol is used to manage and prevent collisions on Ethernet networks, ensuring efficient and reliable data transmission.

    Rate this question:

  • 36. 

    Na slici je prikazana 

    • A.

      Logicka topologija jedan ka svima

    • B.

      Sekvencijalna logicka topologija

    • C.

      Mes logicka topologija

    • D.

      Logicka topologija zvezde

    Correct Answer
    B. Sekvencijalna logicka topologija
  • 37. 

    Po standardu IEEE 802.4 na MAC podsloju je protokol

    • A.

      CSMA/CD

    • B.

      Token Ring

    • C.

      Token Pass

    • D.

      CSMA/CA

    Correct Answer
    C. Token Pass
    Explanation
    The correct answer is Token Pass because the question is asking about the protocol used on the MAC sublayer according to the IEEE 802.4 standard. Token Pass is a protocol used in token passing networks where a token is passed from one device to another to control access to the network. CSMA/CD is a protocol used in Ethernet networks, CSMA/CA is a protocol used in wireless networks, and Token Ring is a protocol used in token ring networks.

    Rate this question:

  • 38. 

    U sekvencionalnoj metodi prosledjivanja poruka

    • A.

      Medjustanice prosledjuju poruke medjumreznom prispupniku

    • B.

      Medjustanice prosledjuju poruke svom sledecem susedu

    • C.

      Medjustanice prosledjuju poruke na svakih 200ps

    • D.

      Medjustanice prosledjuju poruke cntralnoj stanici

    Correct Answer
    B. Medjustanice prosledjuju poruke svom sledecem susedu
    Explanation
    In the sequential message passing method, the intermediate nodes forward messages to their next neighbor. This means that each intermediate node in the network receives a message and then passes it along to the next node in the sequence. This allows for a step-by-step transmission of messages through the network, ensuring that each node receives and forwards the message in a specific order.

    Rate this question:

  • 39. 

    Metodologija prosledjivanja poruke naziva se

    • A.

      Fizicka topologija lokalnih racunarskih mreza

    • B.

      Logicka topologija lokalnih racunarskih mreza

    • C.

      Nacin izracunavanja kasnjenja u lokalnim racunarskim mrezama

    • D.

      Nacin izracunavanja vremena propagacije u lokalnim racunarskim mrezama

    Correct Answer
    B. Logicka topologija lokalnih racunarskih mreza
    Explanation
    The correct answer is "Logicka topologija lokalnih racunarskih mreza" which translates to "Logical topology of local computer networks" in English. This refers to the method or technique used to determine how devices are connected and communicate with each other in a network. It focuses on the logical arrangement of nodes and the flow of data rather than the physical layout of the network.

    Rate this question:

  • 40. 

    Za mrezni saobracaj visokog inteziteta i kratkog tajanja

    • A.

      Optimalna je metoda statickog dodeljivanja kanala sa vremenskom raspodelom

    • B.

      Optimalna je metoda dinamickog dodeljivanja kanala

    • C.

      Optimalna je metoda statickog dodeljivanja sa frekvencijskom raspodelom kanala

    • D.

      Optimalna je metoda statickog dodeljivanja kanala od strane centralne stanice

    Correct Answer
    C. Optimalna je metoda statickog dodeljivanja sa frekvencijskom raspodelom kanala
    Explanation
    The correct answer is "Optimalna je metoda statickog dodeljivanja sa frekvencijskom raspodelom kanala." This means that the optimal method for high-intensity and short-duration network traffic is static channel assignment with frequency channel distribution. This method allows for efficient allocation of channels based on their frequencies, ensuring that the network can handle high-intensity traffic without interference or congestion.

    Rate this question:

  • 41. 

    Koji od iskaza su tacni za podsloj LLC

    • A.

      Opisani su standardom IEEE 802.1

    • B.

      Protokol je za upravljanje logickom vezom

    • C.

      Postavljen iznad IEEE 802.3 protokola

    • D.

      Format, interfejs i protokol zasnivani su naHDLC protokolu

    • E.

      Opisani su standardom IEEE 802.2

    • F.

      Skracenica je od Logical Link Control

    • G.

      Postavljen ispod IEEE 802.4 protokola

    • H.

      Skracenica je od Link Level Control

    Correct Answer(s)
    B. Protokol je za upravljanje logickom vezom
    C. Postavljen iznad IEEE 802.3 protokola
    D. Format, interfejs i protokol zasnivani su naHDLC protokolu
    E. Opisani su standardom IEEE 802.2
    F. Skracenica je od Logical Link Control
    Explanation
    The correct answer includes multiple statements that are true about the LLC sublayer. It states that the protocol is used for managing the logical link, it is placed above the IEEE 802.3 protocol, the format, interface, and protocol are based on HDLC protocol, it is described by the IEEE 802.2 standard, and the abbreviation LLC stands for Logical Link Control.

    Rate this question:

  • 42. 

    Prolazak zetona je mehanizam pristupa sa

    • A.

      Unapred odredjenim redosledom

    • B.

      Slucajnim pristupom

    • C.

      Slucajnim pristupom sa ispitivanjem zauzetosti transmisionog medijuma

    • D.

      Unapred odredjenim redosledom sa metodom osluskivanja transmisionog medijuma

    Correct Answer
    A. Unapred odredjenim redosledom
    Explanation
    The correct answer is "Unapred odredjenim redosledom", which means "Access mechanism with a predetermined order." This suggests that the passage of the token follows a specific sequence or order, rather than being random or dependent on the status of the transmission medium.

    Rate this question:

  • 43. 

    Da bi se mogucnosti kolizije umanjile, kod velikog inteziteta saobracaja u Eternet racunarskim mrezama

    • A.

      Kod svake kolizije stanice povecavaju svoje kasnjenje

    • B.

      Kod svake kolizije stanice umanjuju svoje kasnjenje

    • C.

      Kod svake kolizije stanice smanjuju brzinu prenosa

    • D.

      Kod svake kolizije stanice povecavaju brzinu prenosa

    Correct Answer
    A. Kod svake kolizije stanice povecavaju svoje kasnjenje
    Explanation
    In Ethernet computer networks, when there is a high traffic intensity, the chances of collision increase. In order to reduce the possibilities of collision, each station increases its delay. This means that when a collision occurs, the stations involved will delay their transmission, allowing for a better chance of successful transmission in the next attempt.

    Rate this question:

  • 44. 

    Kod sekvencijalne logicke topologije

    • A.

      Podaci se salju centralnoj stanici, pa ona prosledjuje podatke odredisnoj stanici

    • B.

      Podaaci se salju istovremeno svim stanicama na mrezi

    • C.

      Podaci se salju istovremeno samo grupi unapred odredjenih stanica

    • D.

      Podaci se salju od jedne do druge stanice

    Correct Answer
    D. Podaci se salju od jedne do druge stanice
    Explanation
    In a sequential logical topology, data is sent from one station to another station in a sequential manner. This means that the data is transmitted from one station to the next station in a specific order, one after the other. Unlike other options mentioned, where data is sent to a central station or to multiple stations simultaneously, in a sequential logical topology, the data is transmitted from one station to another station in a linear fashion.

    Rate this question:

  • 45. 

    Kod logicke topologije od jednog ka svima (broadcast) svaki cvor odlucuje da li je paket podataka bas njemu upucen. Ukoliko nije

    • A.

      Poruka se prosledjuje centralnoj stanici

    • B.

      Poruka se prosledjuje susednom cvoru

    • C.

      Obavestavaju se visi slojevi o gresci

    • D.

      Poruka se jednostavno ignorise

    Correct Answer
    D. Poruka se jednostavno ignorise
    Explanation
    In the logical topology of one-to-all broadcast, each node decides whether the data packet is intended for it. If it is not, the message is simply ignored.

    Rate this question:

  • 46. 

    Delimicno dodeljivanje kanala vezano je za sisteme

    • A.

      Sisteme sa vremenskim multipleksom

    • B.

      Sisteme sa kodnim multipleksom

    • C.

      Sisteme sa frekventnim multipleksom

    • D.

      ALOHA sisteme

    Correct Answer
    D. ALOHA sisteme
    Explanation
    Delimicno dodeljivanje kanala je povezano sa ALOHA sistemima. Ova tehnika se koristi u bežičnim komunikacionim sistemima gde se kanali delimično dodeljuju različitim korisnicima. ALOHA sistem omogućava korisnicima da nezavisno pristupaju kanalu i šalju svoje podatke, ali postoji mogućnost kolizije podataka. Ova tehnika se koristi u sistemima sa vremenskim multipleksom, kodnim multipleksom i frekventnim multipleksom kako bi se efikasno upravljalo deljenim kanalima.

    Rate this question:

  • 47. 

    Ako stanica koristi CSMAA mehanizam za slanje podataka, ona

    • A.

      Odmah salje podatke i ceka potvrdu o prijemu

    • B.

      Prvo proverava da li je transmisioni medijum zauzet

    • C.

      Salje kontrolni paket prvoj susednoj stanici

    • D.

      Odmah salje podatke i ne ceka potvrdu o prijemu

    Correct Answer
    B. Prvo proverava da li je transmisioni medijum zauzet
    Explanation
    If a station uses the CSMAA mechanism for data transmission, it first checks whether the transmission medium is busy before sending any data. This is because CSMAA (Carrier Sense Multiple Access with Collision Avoidance) is a protocol that allows multiple stations to share the same transmission medium. By checking if the medium is busy, the station can avoid collisions with other stations that may be transmitting data at the same time. Therefore, the correct answer is "Prvo proverava da li je transmisioni medijum zauzet" (First checks whether the transmission medium is busy).

    Rate this question:

  • 48. 

    Kolizija na transmisionom medijumu

    • A.

      Poboljsava karakteristike saobracaja u mrezi

    • B.

      Je nepozeljna pojava u mreznom saobracaju

    • C.

      Je metod dodeljivanja kanala u transmisionom medijumu

    • D.

      Je karakteristika prenosa podataka u lokalnim racunarskim mrezama

    Correct Answer
    B. Je nepozeljna pojava u mreznom saobracaju
    Explanation
    Kolizija na transmisionom medijumu se odnosi na situaciju kada se dva ili više uređaja istovremeno pokušavaju koristiti isti komunikacioni kanal za prenos podataka. Ovo je nepoželjna pojava u mrežnom saobraćaju jer može dovesti do gubitka podataka ili sporijeg prenosa. Kolizija se javlja u mrežama koje koriste metodu pristupa više korisnika (CSMA/CD) i zahteva dodatne mehanizme kako bi se rešila.

    Rate this question:

  • 49. 

    Ako u jednoj lokalnoj racunarskoj mrezi N stanica koristi FDM sistem za dodeljivanje transmisionog medijuma a u drugoj N stanica koristi CSMA/CD sistem onda je pri istom intezitetu saobracaja odnos kasnjenja

    • A.

      Isti u oba sistema

    • B.

      N puta veci kod FDM sistema nego kod CSMA/CD sistema

    • C.

      N puta mani kod FDM sistema nego kod CSMA/CD sistema

    • D.

      N*2 puta mani kod FDM sistema nego kod CSMA/CD sistema

    Correct Answer
    B. N puta veci kod FDM sistema nego kod CSMA/CD sistema
    Explanation
    The delay in the FDM system is N times greater than the delay in the CSMA/CD system. This is because in the FDM system, the transmission medium is divided into frequency bands and each station is assigned a specific frequency band, resulting in the need for time-sharing and causing a delay. On the other hand, in the CSMA/CD system, stations can transmit data simultaneously but if a collision occurs, there is a backoff mechanism that introduces a delay. Therefore, the delay in the FDM system is N times greater than the delay in the CSMA/CD system.

    Rate this question:

  • 50. 

    Kod mehanizma pristupa sa prolaskom zetona

    • A.

      Stanica ne moze da pristupi transmisionom medijumu dok na nju ne dodje red

    • B.

      Stanica moze da pristupi transmisionom medijumu kada ima podatak za slanje

    • C.

      Stanica moze da pristupi transmisionom medijumu ako je predhodno proverila zauzetost transmisionog medijuma

    • D.

      Stanica moze da pristupi transmisionom medijumu i kada je zauzet jer ima svoj frekvencijski kanal za prenos

    Correct Answer
    A. Stanica ne moze da pristupi transmisionom medijumu dok na nju ne dodje red
    Explanation
    The correct answer is that the station cannot access the transmission medium until its turn comes. This means that the station has to wait for its turn in order to access and transmit data on the medium.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.