What is the last step in data encapsulation?
A.) User information is converted into data.
B.) Segments are converted into datagrams and packets.
C.) Frames are put into bits.
D.) Data is converted into segments.
E.) Packets are put into logical frame.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
The Five steps to data encapsulation (IN ORDER):
1) User information is converted into data.
2) Data is converted into segments.
3) Segments are converted into datagrams and packets.
4) Packets are put into logical frame.
5) Frames are put into bits
Is This Answer Correct ? | 18 Yes | 0 No |
Which command we give for live view of remote site routers?
hi friends i have some problem regarding technical round ahr round plz tell me what should the right answer technical questions 1 what is brouter 2 what is the menaing of 10 base2, 10 base 5 and 10baset 3 what is diffrence between bit rate and baud rate. and this question was tooooooooooo much difficult to me that hr said to me that rank me after the taking the all short of interview
The Network layer works with which of the following: A.) Globules B.) Bits C.) Packets D.) Segments E.) Frames
What is the default size of a standard ping on a Cisco router? * A: 100 bytes * B: 32 bytes * C: 10 bytes * D: 16 bytes
What utility can you use to see the path a packet takes through an internetwork? A.) Route B.) SNMP C.) Trace D.) Ping
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet
How can you measure out exactly 4 litres of water from a tap using a 3 litre and a 5 litre bucket?
1350 Value in which type of access-list?
Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP
Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode
In which access- list type you can't do editing?