Computer Networking
When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system?

Security procedure
Log-on procedure
Identification procedure
None of these
Safeguard procedure

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for encapsulation?

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
None of these
a technique used in best-effort delivery systems to avoid endlessly looping packets.
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
All of these

ANSWER DOWNLOAD EXAMIANS APP