What protocol is responsible for fragmenting datagrams that exceed the maximum length permissible on a network?
a. TCP
b. UDP
c. ICMP
d. IP
Answer: d. IP
Computer Science & Information Technology
You might also like to view...
The _____ keyword is required to use relational operators in a Case statement.
a. To b. else c. If d. Is
Computer Science & Information Technology
____________ are small devices that plug into a computer’s USB port and appear to the system as disk drives.
a. Virtual disk drives b. Universal Serial Bus (USB) drives c. Floppy disk drives d. External disk drives
Computer Science & Information Technology
The data that you entered into a ____ is collected by a program that runs on the Web site's server.
A. form B. table C. database D. row
Computer Science & Information Technology
A ________, a second-level menu, displays an arrow to indicate that more options are available
A) shortcut menu B) taskbar C) jump list D) submenu
Computer Science & Information Technology