Matching
Match each correct item with the statement below.
Premises:
The bottom layer of the OSI model.
The task of this layer is to organize bits so that they are formatted into frames.
This layer ensures that data is sent and received in the same order.
This layer is responsible for data encryption.
This is the layer computer programmers use to connect workstations to network services.
Whenever you use an Internet browser, you are working through this layer.
This layer controls the passage of packets along the network.
This layer determines how long a node can transmit and how to recover from transmission errors.
This layer establishes the level of packet error checking.
Responses:
Network Layer
Presentation Layer
Physical Layer
Transport Layer
Application Layer
Session Layer
Data Link Layer
Correct Answer:
Premises:
Responses:
The bottom layer of the OSI model.
The task of this layer is to organize bits so that they are formatted into frames.
This layer ensures that data is sent and received in the same order.
This layer is responsible for data encryption.
This is the layer computer programmers use to connect workstations to network services.
Whenever you use an Internet browser, you are working through this layer.
This layer controls the passage of packets along the network.
This layer determines how long a node can transmit and how to recover from transmission errors.
This layer establishes the level of packet error checking.
Premises:
The bottom layer of the OSI model.
The task of this layer is to organize bits so that they are formatted into frames.
This layer ensures that data is sent and received in the same order.
This layer is responsible for data encryption.
This is the layer computer programmers use to connect workstations to network services.
Whenever you use an Internet browser, you are working through this layer.
This layer controls the passage of packets along the network.
This layer determines how long a node can transmit and how to recover from transmission errors.
This layer establishes the level of packet error checking.
Responses:
Related Questions
Q6: Which is not true about FDDI?<br>A)It uses
Q7: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TBX8618/.jpg" alt=" The figure above
Q8: In a connectionless protocol a logical connection
Q9: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TBX8618/.jpg" alt=" The figure above
Q10: Which is not true about bus networks?<br>A)They
Q12: A(n)T-carrier line is a dedicated telephone line
Q13: _ is used to provide a way
Q14: Satellite is the most expensive way to
Q15: All MAUs must have terminators.
Q16: The MAC sublayer of the Data Link