answersLogoWhite

0


Best Answer

Computers listen to the network for clearance to send data.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA CD network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How does network monitoring help ensure your computer is running smoothly?

Network monitoring software helps a computer run smoothly by monitoring the computer's network and sending alerts to warn that there is a problem long before system failure occurs.


How do you ensure network security?

To ensure network security, you have to install protective software and have firewalls on your server.


Which is an example of a network utility that can be used to ensure your computer is connected to a network?

Typically, for Windows computers, the Network and Sharing Center is the tool used to determine network connectivity and troubleshoot connection problems. On a Windows computer, go to your start button (the windows logo in the bottom left hand corner of your screen), select "Control Panel" then select "Network and Internet" then select "Network and Sharing Center."


Which technique is an example of operating system hardening?

Type your answer here... Enable IP filteringAnswer Explanation: To ensure operating system hardening, you should enable IP filtering within the operating system whenever possible. This restricts the type of services that users can connect to, regardless of the computer's logical position within the network.


Cisco IP Communicator registration rejected Error DBConfig?

•Ensure that device record that you have created matches the device name chosen with Cisco IP Communicator (right-click > Preferences > Network tab). •Ensure that the selected network adapter still exists in the computer (for example, ensure that a selected wireless card has not been removed). •Ensure that Cisco IP Communicator is configured to use the correct TFTP server setting (right-click > Preferences > Network tab).


What allows hackers to take control of your PC from another computer?

Mostly, it is the result of poor computer security. For minimal security you should ensure you have up-to-date anti-virus software installed on your computer as well as a firewall. It's also a good idea to ensure that any WiFi network in your home or business is password protected.


What is the demands of network operating system?

The demands of a network operating system are to be able to share resources, and ensure network security.


What can help ensure system reliability by detecting repelling and coping with network attacks?

Network firewallscan


What is the conclusion of network and communication?

The Native Computer Communications Network Project was a good example of how a focus on creating a network of computers does not necessarily ensure the interpersonal networking of the potential users of that technology. If the people were not communicating with each other before, developing another method of communication doesn't mean they'll start.


Objective of security analysis?

The objective of a security analysis is to ensure your computer network is as secure as possible. A security analysis will help you find weaknesses in your system in order to develop your security protocols.


Why is it a good idea to reformat and reinstall the operating system before reassigning a computer?

To ensure any transient user settings and latent viruses are not transferred to the new user and reintroduced to the network.


What is an easy way to do small network monitoring?

The absolute easiest way to ensure that no one is abusing the bandwidth they are given is to monitor upload and downloads on each computer. That way if someone goes over the limit by a lot you will know exactly what computer it was done on.