In _________ protocols, we use ________.

A. character-oriented; byte stuffing
B. character-oriented; bit stuffing
C. bit-oriented; character stuffing
D. none of the above

A. character-oriented; byte stuffing

Share the Post

Leave a Reply

Your email address will not be published. Required fields are marked *