The ________ contains I/O protocols that are mapped on to the transport layer.

A. cable
B. application
C. common transport
D. physical


B. application

Computer Science & Information Technology

You might also like to view...

A _______ is the general term for a collection of key-value pairs.

a) book b) glossary c) dictionary d) lexicon

Computer Science & Information Technology

Which of the following provides the most common and comprehensive list of vulnerabilities?

A) CVE B) NIST C) OWASP D) None of the above

Computer Science & Information Technology

Match each item with a statement below.

A. A graphical e-mail client for KDE that's compatible with major Internet mail standards. B. A type of IMAP server designed to handle increased demands, such as adding thousands of mail accounts. C. A Linux utility that helps you filter and sort incoming e-mail. D. A text-based MUA that enables users to access their mailboxes for reading stored messages and sending e-mails to other users. E. The preferred MTA on openSUSE Linux systems. F. The most widely used MTA on UNIX/Linux systems. G. A graphical e-mail client for GNOME designed to help users with office tasks, such as storing, organizing, and retrieving personal information. H. A modular MTA designed to be more secure and faster than sendmail. I. A text-based MUA that downloads e-mails from an ISP's mail server and places them in users' mailboxes.

Computer Science & Information Technology

In SharePoint, there are ________ different default permission levels

A) four B) seven C) nine D) six

Computer Science & Information Technology