1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
9 months ago
8

Network layer protocols specify the _______ structure and processing used to carry data between hosts.

Computers and Technology
1 answer:
kari74 [83]9 months ago
3 0

Network layer protocols specify the  <u>packet structure</u> and processing used to carry data between hosts.

<h3>What is the Network layer protocols  about?</h3>

The header, payload, as well as the trailer of a network packet are its three component pieces. The underlying network architecture or protocol employed determines the format and size of a network packet. A network packet resembles a package in concept.

Therefore, Network layer protocols define the packet format and processing needed to transfer data from one host to another host, in contrast to the Transmission layer (OSI Layer 4), which controls the data transport between the programs operating on each end computer.

Learn more about Network layer from

brainly.com/question/14476736
#SPJ1

You might be interested in
Give me a code that draws a house with a roof in python. Please Answer!!!
Varvara68 [4.7K]

import turtle

window = turtle.Screen()

tr = turtle.Turtle()

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.back(100)

tr.left(120)

tr.forward(75)

tr.right(78)

tr.forward(60)

window.mainloop()

In my code, we use the turtle module for the graphics to draw the house with a roof.

8 0
2 years ago
Which website is important for hacking
Yuliya22 [10]

Answer:

Here's a few

Explanation:

  • SQL Injection attacks. SQL Injection attack is the most common website hacking technique. ...
  • Cross Site Scripting (XSS) ...
  • Denial of Service (DoS/DDoS) ...
  • Cross-site request forgery (CSRF or XSRF) ...
  • DNS Spoofing (DNS cache poisoning) ...
  • Social engineering techniques.

Glad I could help!!

6 0
2 years ago
Hayne is starting his own business as a psychotherapist and needs to post a website advertising his services,contact information
irina1246 [14]

The kind of website which would best suit Hayne's needs is a: C) Dynamic website.

A website is the collective name that is used to describe series of interconnected webpages having a unique domain name.

Basically, a website is an HTML document which comprises codes, tags, images, audios, and videos that are integrated to make them responsive and interactive with clients (end users).

In Computer and Technology, there are four (4) main types of website and these include:

  • Static website.
  • E-commerce website.
  • Scripted website.
  • Dynamic website.

A dynamic website is a type of website which is designed to contain information that automatically changes based on the client, time zone, time of the day, language, services, and other factors.

In this scenario, the kind of website which would best suit Hayne's needs is a dynamic website because his services, tips or contact information may change.

Read more: brainly.com/question/21694571

7 0
2 years ago
Which type of operating system is usually used in personal computers?
joja [24]

Answer:

Microsoft Windows

Explanation:

7 0
3 years ago
Read 2 more answers
6. Assume a processor supports all instructions and addressing modes. A program consists of 25% store words, 15% load words, 10%
Sloan [31]

Answer:

After checking the attached picture, come to this calculated "Total Time".

Total time 'T'

T = (0.25)(200) + (0.15)(200) + (0.1)(250) + (0.05)(175) + (0.45)(75)

T = 147.5 ps

8 0
2 years ago
Other questions:
  • Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the Ruler option to achieve thi
    5·2 answers
  • _____ is a valuable tool that enables you to find information on the web by specifying words or phrases know as keywords- which
    14·1 answer
  • Hy i am new anybody here​
    10·2 answers
  • A common technique for masking contents of messages or other information traffic so that opponents can not extract the informati
    14·1 answer
  • Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
    8·1 answer
  • Each Google My Business location has a unique ID that applies changes to the right listing.
    11·1 answer
  • To join a social network you create an avatar true or false
    6·2 answers
  • im past 1000 pts and it still hasnt up my rank from VIRTUOSO to EXPERT can someone explain and yes i have brainly plus
    7·2 answers
  • Question # 1
    12·2 answers
  • A computer is performing a binary search on the sorted list of 7 numbers below. What is the maximum number of iterations needed
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!