Match each item with a statement below.

A. Computers operate at this layer.
B. This layer handles data formatting and translation.
C. This handles communication setup and teardown.
D. This uses port numbers as source and destination identifiers
E. Routers operate at this layer.
F. Switches operate at this layer.
G. Hubs operate at this layer.
H. Sublayer manages access to the physical medium.
I. This sublayer is responsible for some error recovery.
J. This is the general framework for how networking systems should operate.


A. Application layer
B. Presentation layer
C. Session layer
D. Transport layer
E. Network layer
F. Data Link layer
G. Physical layer
H. Media Access Control sublayer
I. Logical Link Control sublayer
J. OSI reference model

Computer Science & Information Technology

You might also like to view...

One common way to deal with spam that makes it to your computer is to use a/an ____.

Fill in the blank(s) with the appropriate word(s)

Computer Science & Information Technology

_________ such as smartphones and tablets are small computers we carry with us.

a. Mobile devices b. Minicomputers c. Netbooks

Computer Science & Information Technology

____ is a generic term that refers to any type of malicious software.

A. Spamware B. Malware C. Spyware D. Badware

Computer Science & Information Technology

Sharing your presentation with others from a shared folder can lead to ________ changes made to your presentation

Fill in the blank(s) with correct word

Computer Science & Information Technology