____ traffic is traffic sent to all users on the network.

A. Unicast
B. Broadcast
C. Singlecast
D. Multicast


Answer: B

Computer Science & Information Technology

You might also like to view...

Digital forensics operations are often ____.

A. inhouse B. contracted C. permanent D. outsourced

Computer Science & Information Technology

Which of the following is NOT an element of asymmetric cryptography?

A. Public key B. Key pairs C. Hash algorithm D. Private key

Computer Science & Information Technology

A task is an activity that is completed to reach a project goal

Indicate whether the statement is true or false

Computer Science & Information Technology

A ScreenTip automatically appears when a mouse pointer is positioned over a button.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology