281. In _________ methods, a station cannot send unless it has been authorized by other stations.
Correct answer: (B)
controlled access
282. In _________ methods, no station is superior to another station and none is assigned the control over another.
Correct answer: (A)
random access
283. In _________ methods, the stations consult one another to find which station has the right to send.
Correct answer: (B)
controlled access
284. In _________ protocols, we use _________.
Correct answer: (A)
character-oriented; byte stuffing
285. In _________ schemes, the voltages are on the both sides of the time axis. For example, the voltage level for 0 can be positive and the voltage level for 1 can be negative.
Correct answer: (A)
polar
286. In _________ signaling, the same circuit is used for both signaling and data.
Correct answer: (A)
in-band
287. In _________ switching, the paths in the circuit are separated from one another spatially.
Correct answer: (B)
space-division
288. In _________ TDM, each input connection has an allotment in the output even if it is not sending data.
Correct answer: (A)
synchronous
289. In _________ TDM, slots are dynamically allocated to improve bandwidth efficiency.
Correct answer: (B)
statistical
290. In _________ there are no setup or teardown phases.
Correct answer: (A)
datagram switching