1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katovenus [111]
3 years ago
5

why is wrong timing, poor technology, bad implementation and politics in business affected the OSI model as a standard

Computers and Technology
1 answer:
salantis [7]3 years ago
5 0

Answer:

In the academic environment, TCP / IP was much preferred because the OSI model was thought to be inferior to the TCP/IP model

Explanation:

The following show how business affected the OSI model as a standard:

WRONG TIMING

When OSI was made, TCP / IP was already in use. Also nobody wanted to be the first to start using OSI.

POOR TECHNOLOGY

Both the presentation and session layer that was dedicated in OSI was very little.

The technology used was very difficult to understand.

BAD IMPLEMENTATION

The initial implementation of OSI model was very slow and the OSI layer 7 model had bad quality.

POLITICS

In the academic environment, TCP / IP was much preferred because the OSI model was thought to be inferior to the TCP/IP model. They where rumors that the OSI was for the European and US government.

You might be interested in
Write a statement that increments numUsers if updateDirection is 1, otherwise decrements numUsers. Ex: if numUsers is 8 and upda
Lady_Fox [76]

Answer:

Following are the statement is given below

if(updateDirection ==1) // check condition

{

++numUsers; // increments the value

}

else

{

--numUsers; // decrement the value

}

Explanation:

Following are the description of statement

  • Check the condition in the if block .If the "updateDirection" variable is 1 then then control moves to the if block otherwise control moves to the else block statement.
  • In the if  block the statement is "++numUsers" it means it increment the value by 1 .
  • In the else block the statement is "--numUsers" it means it decrement  the value by 1 .

4 0
3 years ago
Match each definition to the correct type of media.
Murrr4er [49]

Answer:

1-2

2-3

3-1

Explanation:

I couldn't find a way to explain this.

6 0
3 years ago
Read 2 more answers
Does anyone play genshin impact here?
Reika [66]
Answer


NO sorry
Have a great day
6 0
3 years ago
Read 2 more answers
In the SDLC's third phase, the way in which a proposed information system will deliver the general abilities described in the pr
kifflom [539]

Answer: Detailed

Explanation:

SDLC consist of 7 phases. They are:

1. Planning.

2. System analysis and requirement

3. Design:

4. Coding:

5. Testing:

6. Installation

7. Maintenance

Here we are talking of the third phase. In this phase it is the design phase which consist of high and low level design. Here the preliminary design is included in high level design where it describes the required hardware, software, network capabilities and the modelling of the interface. However the detailed design in low level design will implement the coding and will finding of any errors in the implemented design as described by the preliminary design.

3 0
3 years ago
The users in your organization bring their own mobile devices to the office and want to be able to access the network with them.
Afina-wow [57]

Answer:

The Windows feature that can be used to protect a network from malware threats that might be on the network user's mobile devices is;

Device Health Attestation (DHA)

Explanation:

Device Health Attestation (DHA) is a feature introduced in version 1507 of widows 10 that enables increased security of the network of enterprises to have mainly hardware which are attested and monitored using cloud based service health check or DHA service on Windows Server 2016.

Device Health Attestation carries out assessments on devices based on Windows 10 devices and Windows 10 mobile devices that work with TPM 1.2 or 2.0 and devices which are within the premises

Items checked include boot configuration and attributes such as Secure Boot, ELAM, and BitLocker

Corrective action are triggered by Mobile Device Management (MDM) based on report data from the DHA.

4 0
3 years ago
Other questions:
  • The work principle is not always true<br> T or F
    11·2 answers
  • In Windows Vista, the Run command can be found in which application?
    6·1 answer
  • To have different formatting for odd and even rows, select the _____ option.
    8·1 answer
  • What is an example of how pseudo - randomness is used to creative variation​
    5·1 answer
  • What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
    9·2 answers
  • Write the definition of a method min that has two int parameters and returns the smaller.
    9·1 answer
  • Which option is considered a part of the document that is used to collect specific and predefined information?
    7·1 answer
  • How to fix a light blub
    11·2 answers
  • Im learning about AI in my class and I'm confused about these two questions
    9·2 answers
  • a web server will utilize a directory protocol to enable users to authenticate with domain credentials. a certificate will be is
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!