Connectionless transmission bundles and sends information in packets, called_______.

a) datagrams.
b) frames.
c) chunks.
d) None of the above.

a) datagrams.

Computer Science & Information Technology

You might also like to view...

The pen shape used to create table borders is called the:

A) Markup pen. B) Draw pointer. C) Border pointer. D) Outline tool.

Computer Science & Information Technology

The Computer Security Act charges the National Bureau of Standards, in cooperation with the National Security Agency (NSA), with the development of five standards and guidelines establishing minimum acceptable security practices.  What are three of these principles?

What will be an ideal response?

Computer Science & Information Technology