adplus-dvertising
frame-decoration

Question

The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?

a.

An alias for the computer name

b.

The logical domain address for the workstation

c.

A physical address that is assigned by the manufacturer

d.

A physical address that is randomly assigned each time the computer is started

Posted under Networking

Answer: (b).The logical domain address for the workstation

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?

Similar Questions

Discover Related MCQs

Q. Error detecting code is

Q. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.

Q. In cyclic redundancy checking, the divisor is _____ the CRC.

Q. In cyclic redundancy checking what is the CRC?

Q. In CRC the quotient at the sender

Q. Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries?

Q. The data-link layer, in reference to the OSI model, specifies

Q. What function does a serial interface perform in data communication?

Q. Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?

Q. Piggybacking protocol is a technique used for

Q. The frame type that refers to High-level Data Link Control error detection field is

Q. In Asynchronous Balanced Mode (ABM), the link is

Q. In byte stuffing, a special byte is added to the data section of the frame when there is a character with the same pattern as the

Q. In the transition phase, the term that refers to start of the communication is

Q. Internet users use the

Q. The term that refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment is

Q. The sequence numbers of the Stop-and-Wait Automatic Repeat Request are based on

Q. In the Password Authentication Protocol (PAP), the value of the protocol field is

Q. The Link Control Protocol packet that refers to accept the shut down request is used the code of

Q. In the Internet Protocol Control Protocol (IPCP), the code value of Ox04 is used to represent the packet of