What is a protocol
Answers were Sorted based on User's Feedback
Answer / subu.ns
A protocol is a setup rule of connected system.It is a
common language used to communication.
| Is This Answer Correct ? | 27 Yes | 0 No |
Answer / devdarshan
A protocol is a setup rule of connected system.It is a
common language used to communication.
| Is This Answer Correct ? | 10 Yes | 0 No |
A protocol is a set of rules that governs the
communications between computers on a network. In order for
two computers to talk to each other, they must be speaking
the same language
| Is This Answer Correct ? | 8 Yes | 0 No |
Answer / thalapathi muthukumar
A protocol is a set of rules that governs by the both two
communication entities.It have how the data is
transmitted,where the data is communicated,and when the data
is communicated.
| Is This Answer Correct ? | 7 Yes | 0 No |
Answer / parthipan
IS A SET OF RULES AND REGULATIONS USED FOR COMMNICATE
DEVICES IN THE NETWORK
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / yogesh
Tn the network ,when two or more computer(devices) want to
speak with each other, they must have a common language to
understad each other ,thease common language is known as a
protocol.
| Is This Answer Correct ? | 6 Yes | 2 No |
Answer / anoop
Its a rules & regulations followed by networking.
| Is This Answer Correct ? | 4 Yes | 1 No |
As the system administrator, you enter the following commands at the command prompt: ipx routing access-list 800 permit 2b 4d int e0 ipx network 4d ipx access-group 800 out int e1 ipx network 2b int e2 ipx network 3c What did these command accomplish? A. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0. B. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0. C. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. D. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via UDP. Don't worry about the other access list lines.
Which IEEE standard is used to define Wi-Fi? A. IEEE 802.3 B. IEEE 802.5 C. IEEE 802.11h D. IEEE 802.11c E. IEEE 802.11
What is the syntax of ipv4?
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
What is L2 Link and its significance regarding IP addressing.
Identify the default IPX serial encapsulation? A.) Novell-Ether B.) SDLC C.) SNAP D.) HDLC
How does a switch use store and forward? A.) By using a Class I repeater in a collision domain B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C.) By using broadcast addresses as source addresses D.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets
What is icmp protocol?
Which OSI layer handles physical address, network topology? A.) Presentation B.) Physical C.) Transport D.) Application E.) Data-Link F.) Network