Question
a.
a very common bit-oriented data link protocol issued to ISO
b.
a method access control technique or multiple-access transmission media
c.
network access standard for connecting stations to a circuit-switched network
d.
a method of determining which device has access to the transmission medium at any time
Posted under Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. MAC is
Similar Questions
Discover Related MCQs
Q. What operates in the Data Link and the Network layer?
View solution
Q. An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as
View solution
Q. Error detection at the data link level is achieved by?
View solution
Q. Which of the following summation operation is performed on the bits to check an error-detecting code?
View solution
Q. If the ASCII character H is sent and the character I is received, what type of error is this?
View solution
Q. The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?
View solution
Q. Error detecting code is
View solution
Q. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.
View solution
Q. In cyclic redundancy checking, the divisor is _____ the CRC.
View solution
Q. In cyclic redundancy checking what is the CRC?
View solution
Q. In CRC the quotient at the sender
View solution
Q. Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries?
View solution
Q. The data-link layer, in reference to the OSI model, specifies
View solution
Q. What function does a serial interface perform in data communication?
View solution
Q. Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?
View solution
Q. Piggybacking protocol is a technique used for
View solution
Q. The frame type that refers to High-level Data Link Control error detection field is
View solution
Q. In Asynchronous Balanced Mode (ABM), the link is
View solution
Q. In byte stuffing, a special byte is added to the data section of the frame when there is a character with the same pattern as the
View solution
Q. In the transition phase, the term that refers to start of the communication is
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!