adplus-dvertising
frame-decoration

Question

What does the transport protocol do?

a.

It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes the data to the application through the session layer interface.

b.

It provides low-level access to the network adapters by providing data transmission support and some basic adapter management functions

c.

It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services

d.

It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session

Posted under Operating System

Answer: (a).It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes the data to the application through the session layer interface.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What does the transport protocol do?

Similar Questions

Discover Related MCQs

Q. Bridges operate at the MAC layer (layer 2 of the OSI model.)

Q. You need to install network adapters in 20 ISA-bus computers. Which rule must you follow when installing the network adapters?

Q. Routers are often used to implement FIREWALLS

Q. You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose?

Q. Maria needs to install software on a Windows NT Server computer which is a backup domain controller. When she attempts to log on to the server, she receives the message "Unable to log on locally". What must you do to enable Maria to log on to the server?

Q. Why does a high number of broadcast messages adversely affect overall network performance?

Q. You want to find out which users are currently using a specific directory on a Windows NT Server computer. How should you do this?

Q. Dynamic Host Configuration Protocol [DHCP]

Q. Bridges are ideally used in environments where there a number of well defined workgroups

Q. A company has a department that consists of 15 engineers. The engineers have data that needs to be accessible only to their own team. The department continually has engineers arriving and departing, and it is difficult to identify a single administrator for the department Which model would be the best for this situation?

Q. A one-way trust relationship has been established in which the RESEARCH domain trusts the TESTING domain. The Guest account is disabled in both domains. As a user belonging to a global group called Testers in the TESTING domain, you want to access a shared directory on a Windows NT Advanced Server in the RESEARCH domain. Which action would give you access?

Q. Assume that all users are members of the ACE domain and that most of the resources exist in the PUBS and CAD domains. You are a user with administrator rights in all domains. How would you allow users to access all of the resources, with a minimum set of trust relationships?

Q. When of the following is a system default profile used?

Q. In UTP Cat 5 wiring, patch cables from the wall outlet to the PC have a distance limitation of

Q. In which of the following cable systems are T connectors and terminators are used?

Q. An ethernet switch works at the protocol layer

Q. You want to keep an individual from logging on to a Windows NT Server computer by using the default Administrator account. How should you do this?

Q. There are two domains on your network. The DESIGN domain trusts the SALES domain. A color printer is shared in the DESIGN domain, and print permissions have been granted to the Domain Users and Domain Guests groups in the DESIGN domain. The Guest account has been enabled in the DESIGN domain. User John Y logs on using his account in the SALES domain. What must you do to allow JohnY to access the printer?

Q. Another drawback with repeaters is that the traffic generated on one segment is propagated onto the other segments

Q. What does the Directory Replicator service allow you to do?