What protocol is the most widely used and allows all computers on a network to communicate and functioncorrectly?

A. IPX/SPX
B. ATM
C. TCP/IP
D. NetBIOS


Answer: C

Computer Science & Information Technology

You might also like to view...

To discover the size of the graphics file, you should select the _____ option from the drop-down menu.

A. Properties B. Image size C. Image properties D. Show picture

Computer Science & Information Technology

In Alice, the ____ button can be used if you are unhappy with one of your moves.

A. Add instance to world B. Undo C. create new method D. ADD OBJECTS

Computer Science & Information Technology

Which of the following layer of the OSI model is responsible for addressing of the packets?

A. Presentation B. Session C. Network D. Transport

Computer Science & Information Technology

Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence. ? What must Jacob maintain so the evidence can be used to prosecute the crime?

A. Incident documentation B. Chain of custody C. A backup of the data D. Private property laws

Computer Science & Information Technology