What is the unit of data working in the data link layer

Assignment Help Basic Computer Science
Reference no: EM13208202

1. What is the unit of data working in the Data Link layer? a) Bit b) Frame c) Segment d) Packet 2. What is the unit of data working in the Transport layer? a) Bit b) Frame c) Segment d) Packet 3. Flow control is used to prevent network congestion. Which one of the following methods is not related to flow control? a) Windowing b) Buffering c) Source-quenching d) Encapsulating

Reference no: EM13208202

Questions Cloud

Create an html5 document that contains an unordered list : Create an HTML5 document that contains an unordered list with links to the following examples headings, email, images as hyperlink these are from textbook, special characters, tables, HTML5 forms, and internal links to be included.
Compute the standard free energy change per mole : Calculate the standard free energy change per mole assocatiated with the formation of solid SrSO4. Use the solubility product. Remember G(standard) equals -RTln(K) when all surface effects are neglected.
What is the technique called : In the transport layer, data transmission is controlled to ensure data integrity and avoid data loss. What is the technique called?
Calculate the optimal production each of for four products : Calculate the volume of activity that the company will have to achieve in order to meet the targeted level of profit for each one of the four products.
What is the unit of data working in the data link layer : What is the unit of data working in the Data Link layer?
Explain how would the individual demand curves shift : Suppose the quantity of good X demanded by individual 1 is given by X1 = 10 2PX + 0:01I1 + 0:4PY and the quantity of X demanded by individual 2 is X2 = 5  PX + 0:02I2 + 0:2PY a) What is the market demand function for total X (= X1+X2) as a function o..
Which of the following are advantages of the osi model : The OSI model was designed to provide a framework for networking and internetworking standards. Which of the following are advantages of the OSI model? There are 4 correct answers.
Distinguish between the different types of costs : How do managers overcome the natural tendency to consider historical and sunk costs when evaluating business alternatives?
Which of the following is wrong : Which of the following is wrong? A. LDX #$5000 B. LDX #2550 C. LDX #$10000 D. LDX #$00 Explain Why!

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Function that finds the smallest element

Function that finds the smallest element in an array of double values using the following header: double min(double array[], int size)

  Video memory is needed to store picture as true color image

how much memory is required to store the picture? How much video memory is required to store the picture as a ''true color'' image, at 3 bytes per pixel?

  Relationship between squared biases and variances

Assume we have sample of N pairs xi, yi drawn i.i.d. from distribution characterized as given: xi ∼ h(x), design density. Illustrate relationship between squared biases and variances.

  Why computer literacy has become fourth fundamental skill

Explain whether today, computer literacy (knowledge of how to properly use computer and its software applications) has become fourth basic skill.

  Is it beneficial to give young children with computers

After reading information under heading Statuses, explain and provide the example of each of the following as each applies to you and your life.

  Individual traffic light has at least three states (g.y,r)

Consider a traffic light system at a four-way crossroads (two roads intersecting at right angles) with a countdown timer, a crosswalk button, and a speaker that announces it's ok or not ok to walk

  Banner advertising on web sites trigger realization

Banner advertising on Web sites helps trigger realization that there is gap between reality and desired state which occurs in?

  Hexadeciaml numerals are integers written

Hexadeciaml numerals are integers written in base 16. The digits used are '0' through '9' plus 'a' for the "digit 10", 'b' for the "digit 11", 'c' for the "digit 12", 'd' for the "digit 13", 'e' for the "digit 14", and 'f' for the "digit 15". For exa..

  Remember to make only one step at a time

Prove the following. Remember to make only one step at a time and not skip steps. Remember to write what rule allowed you to make each step, and which lines you applied it to

  Encryrption of some unknown

Assume (A1,B1) is an encryrption of some unknown m1. Prove that (A1,B2g^(m2) mod p) is a valid  encryption of m1 + m2 mod p. More generally, if (A2,B2) is an encryption of m2, what is (A1A2  mod p,B1B2 mod p) an encryption of?

  Explain how this application can be used

Explain how this application can be used to collect data from customers and employees to improve operational performance

  Write files which do not reside at root or master directory

Provide the example of names of three files from own computer that do not reside at the root or master directory. For each file, list both therelative filename and its complete filename.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd