1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
2 years ago
7

What are the 7 layers of cyberspace?​

Computers and Technology
1 answer:
frozen [14]2 years ago
6 0

Answer:

The OSI model's seven layers are the: Human Layer, Perimeter Layer, Network Layer, Endpoint Layer, Application Layer, Data Layer, and Mission Critical Layer . Each layer represents a different stage in network communication, from someone typing on a keyboard to the data your system uses for applications.

You might be interested in
You have just started an internship on a graphic design team and you are learning about graphic formats used on the web. Which o
Aneli [31]

Answer:

Portable Network Graphics is the correct answer of this question.

Explanation:

Portable Network Graphics i is the graphics formats which we use for comic-style drawing Portable Network Graphics is a media structure that is used to compress digital video objects. Portable Network Graphics almost completely overtaken the Graphics Merge Standard (GIF),which has been commonly used during the history.

<u>For example</u>:- Portable Network Graphics images use lossless compression      like GIF files.

  • It has an indexed color raster image and is optimized with a data compression comparable to a GIF file.
  • Portable Network Graphics files are widely used to store opaque background Web graphics, digital photographs and images.

6 0
3 years ago
How to see the range of values of vty lines?
PSYCHO15rus [73]

Answer:

To get the range of very lines in a switch or a router, in the global mode, type " line very" and the question mark after the space. It displays the ranges of valid very lines in the device.

Explanation:

Routers and switches are intermediate components of a computer network. They are used to connect various nodes and networks. For a remote connection, they use the virtual interface called vty to connect to computers for management purposes. These vty lines allows for SSH and telnet access from workstations and the range of very lines are predetermined and limited and varies for all switches and routers.

7 0
4 years ago
. The BEST description of a proprietary database is one that
AVprozaik [17]
Is free to the public
8 0
4 years ago
The ____ flow of information needed from the CSIRT to organizational and IT/InfoSec management is a critical communication requi
Basile [38]

Answer:c)upward

Explanation: Computer security incident response team (CSIRT) is the organization that is responsible for helping others regarding the security of computers incidents that take place.They coordinate with other people of organization for being responsive and controlling the damage.

IT/Infosec(Information security) is the security that manages it through various tools. It protects the network ,application software etc.

The flow of  CSIRT with  IT/Infosec works in the upward direction that is maintaining the contact/communication by collecting the information and then taking action on it. Thus the correct option is option(c) and other option don't provide the correct direction for working.

5 0
3 years ago
I'm trying to self teach myself c# coding language any tips or advice
Kaylis [27]

Answer:

Dont give up lol

Explanation:

8 0
3 years ago
Other questions:
  • Which is a correct statement about having access to technology in a study environment?
    6·2 answers
  • Which of the following terms refers to the horizontal line of continuous cells in a table?
    15·2 answers
  • PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto
    9·1 answer
  • The best way to insert an existing Excel chart into a document is to
    8·1 answer
  • What tab on the Ribbon would you select to create a Photo Album ?
    5·1 answer
  • Which of the following is a setting in both the Transparency panel and the Mirror panel?
    10·1 answer
  • In the ISO/IEC 27002 framework, _________________ describes the use and controls related to encryption.
    15·1 answer
  • The Mac OS was the first to use a graphical user interface.<br><br><br> False<br><br> True
    7·1 answer
  • I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I t
    11·1 answer
  • Assume you have written a method with the header num yourMethod(string name, num code). The method's type is ____ .
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!