Answer:
Two systems are connected by a router. Both systems and the router have transmission rates of 1,000bps. Each link has a propagation delay of 10ms. Also, it takes router 2ms in order to process the packet (e.g. decide where to forward it). Suppose the first system wants to send a 10,000 bit packet to the second system. How long will it take before receiver system receives the entire packet.
Transmission time for first Router = 10,000 bits / 1000 bps = 10 seconds
Receiving time for seond route r= 10,000 bits / 1000 bps = 10 seconds
Propagation delay = 10ms = .01 seconds x 2 for two delays = .02 seconds
First router 2ms to process = .002 seconds
Add all the times together and we get 20.022 seconds which is the same as or 20 seconds and 22 ms
The purpose of OPPA is to make its mandatory for companies to disclose what kind of information they will acquire from their users.
D. It makes it mandatory for companies to disclose what kind of information they will acquire from their users.
<u>Explanation:</u>
OPPA is a Online Privacy Protection Act. It gathers data from individuals who use or visit your site and use it to execute business with them. A few organizations use client data for their very own inner showcasing purposes, for example, to figure out what sort of items or administrations to offer whenever the client utilizes the site or to create focused on arrangements of clients who have similar likes or aversions.
It makes it obligatory for organizations to reveal what sort of data they will secure from their clients. It likewise incorporates data, for example, name, road address, email address, phone number, date of birth, Social Security number, or different insights concerning an individual that could enable a customer to be reached physically or on the web.
Answer:
a) It is used for authentication.
Explanation:
Hashing is a process of transforming a single key into another value. It generates the values using a mathematical algorithm. the outcome of this process is a hash value or a hash.
The hashing process is used for authentication.
The hashing process is not reversible.
The hashing process is used to create the digital signature.
The outcome of the hashing process is the hash value, not a message.