1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mezya [45]
2 years ago
11

Lucy wants to access the webpage. She is using her computer to access the webpage. What types of information will be in one fram

e from Lucy’s computer as a sender until it gets to the webserver as a receiver. You need to explain what is inside the frame structure with an explanation
Computers and Technology
1 answer:
ANTONII [103]2 years ago
6 0

The types of information will be in one frame from Lucy’s computer as a sender until it gets to the webserver as a receiver is known to be her IP address and what she is searching for.

<h3>What is the network about?</h3>

In Communication using a webpage, it often start with a message, or what we call the information, that is known to be sent from one person or device to any other.

Note that in this exchange, there are three elements that are known to be in common which are :

  • The  message source, or sender.
  • The destination, or receiver, of the message.
  • The channel, made up of the transmission media.

Note that if a ‘message’ such as a file, image or video is known to be sent across a network, it is first  divided into small blocks known to be segments. These are known to be kept in containers known as packets, by the Internet Protocol (IP).

Hence, The types of information will be in one frame from Lucy’s computer as a sender until it gets to the webserver as a receiver is known to be her IP address and what she is searching for.

Learn more about webserver from

brainly.com/question/20818461

#SPJ1

You might be interested in
You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a nu
sdas [7]

Answer:

Except more than one token can exist on a token ring network

Explanation:

The token ring is the LAN(Local Area Network) in which the computer systems are connected with each other computers in the form of topologies. In the token ring networks more than one logic tokens from one host to another host.

The token ring has entirely taken over by the Ethernet because it is cheaper and better in price and performance.

3 0
4 years ago
Round 74,361 to the nearest 10​
grandymaker [24]

Answer:

74,400 i think

Explanation:

8 0
3 years ago
What are an administrator's choices for managing file permissions on a drive formatted as fat32?
Alexeev081 [22]
<span>If the drive is a network share, then Share permissions can be used.</span>
6 0
4 years ago
Andrew is researching a new operating system for the computers at his workplace. His boss wants the computers to be able to conn
Bumek [7]

Answer:

Windows 8.1 Core

Explanation:

In this particular example, we're going to use Windows 8.1 Core, is the most basic of the window's family, in this case, only we need an OS to connect the hardware with the cloud computing for security and is not necessary another license, in addition, Windows 8.1 core is easiest to use, is so friendly with the user.

6 0
3 years ago
In what way(s) did the password you tried to use not meet the password policy requirements?
Gre4nikov [31]
Depends on the organization. Password policies differ between each organization. Generally on a mainstream point of view. Passwords should generally be complex. If your passcode is too short. This could pose a risk to your account and the companies data could be at risk.

Broad range of possible pass code rules that may be blocked.

7 character limit
Capital letter and/or number figure
No easy consecutive digit or character: e.g abcd1234
8 0
3 years ago
Other questions:
  • What is the highest education degree available at a community college
    14·1 answer
  • A phone call costs $0.58 plus $0.15 cents per minute. If the total charge for the call was $4.78, how many minutes was the call?
    15·1 answer
  • Declare an array named tax rates of five elements of type double and initialize the elements (starting with the first) to the va
    12·1 answer
  • In 4-bit two's complement representation, what is the binary encoding of the number -5?
    8·1 answer
  • Seven Features of computer aids design software
    6·1 answer
  • In the Sender Message Channel Receiver (SMCR) model, the ______ is the large, bureaucratic organization that produces messages.
    5·1 answer
  • What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
    13·1 answer
  • what is invention and inovation do more responsible think for making computer a succsessful product?explain​
    15·1 answer
  • I need help 50 points and brainiest if you answer
    10·2 answers
  • A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing info
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!