What protocol is responsible for fragmenting datagrams that exceed the maximum length permissible on a network?

a. TCP
b. UDP
c. ICMP
d. IP


Answer: d. IP

Computer Science & Information Technology

You might also like to view...

The _____ keyword is required to use relational operators in a Case statement.

a. To b. else c. If d. Is

Computer Science & Information Technology

____________ are small devices that plug into a computer’s USB port and appear to the system as disk drives.

a. Virtual disk drives b. Universal Serial Bus (USB) drives c. Floppy disk drives d. External disk drives

Computer Science & Information Technology

The data that you entered into a ____ is collected by a program that runs on the Web site's server.

A. form B. table C. database D. row

Computer Science & Information Technology

A ________, a second-level menu, displays an arrow to indicate that more options are available

A) shortcut menu B) taskbar C) jump list D) submenu

Computer Science & Information Technology