What is the first step in data encapsulation?
A.) User information is converted into data.
B.) Frames are put into bits.
C.) Data is converted into segments.
D.) Segments are converted into datagrams and packets.
E.) Packets are put into logical frame.
Answer / guest
Answer: A
The Five steps to data encapsulation (IN ORDER):
1) User information is converted into data.
2) Data is converted into segments.
3) Segments are converted into datagrams and packets.
4) Packets are put into logical frame.
5) Frames are put into bits.
| Is This Answer Correct ? | 6 Yes | 2 No |
what is the reason for creating vlans
How do i decide if an extended access-list is in or out?
Can you explain encapsulating, carrier and passenger protocol?
WHAT IS SERIAL TRANSMISSIONS,PARALLELL TRANSMISSION
What are the things that can be accessed in a CISCO router’s identifying information?
Identify the command mode necessary to enter the standard ping command? A.) Router(config)# B.) Router> C.) Router(std-ping)# D.) Router(config-if)#
What is the command for change serial cost?
What is Spanning Tree Protocol and how it work? I know it is - STP is Spanning tree Protocol. It Stops the looping in the network? How STP work? How it stop Looping in network?
Which routing protocols uses connection-oriented routing updates? A.) IGRP B.) UDP C.) RIP D.) IP E.) BGP
what is used for passive intercae comand mine answer-to prevent to take update from outside
Which command will display the IPX routing table? A.) show routes B.) show routes ipx C.) show routes protocol=ipx D.) show ipx E.) show ipx route
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp