In ________ protocols, we use ________.

A. byte-oriented; bit stuffing
B. character-oriented; bit stuffing
C. bit-oriented; bit stuffing
D. none of the above

C. bit-oriented; bit stuffing
Share the Post

Leave a Reply

Your email address will not be published. Required fields are marked *