The four layers of the TCP/IP protocol stack, in order from highest to lowest, are __________, __________, __________ and __________.

a) application, transport, network, link
b) application, network, transport, link
c) network, link, application, transport
d) link, transport, application, network


a) application, transport, network, link

Computer Science & Information Technology

You might also like to view...

What is the effect of the following import statement?

``` import java.awt.*; ```

Computer Science & Information Technology

What type of malware is typically added to a legitimate program but lies dormant until it is triggered by a specific event?

A. logic bomb B. spam C. zombie D. ransomware

Computer Science & Information Technology

A(n) ________ list can be applied to bullet points in place of bullet symbols

Fill in the blank(s) with correct word

Computer Science & Information Technology

Round the values down at the places noted.

39.965 at tenths place

Computer Science & Information Technology