1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
3 years ago
14

The dlci field in the frame relay header is _________ bits long.

Computers and Technology
1 answer:
ycow [4]3 years ago
4 0
6 or 10-bit length

DLCI (Data Link Connection Identifier) is the essence of the Frame Relay Header. This value length represents the virtual connection between the DTE and the switch. The DLCI values are unique only to the physical channel on which they reside and thus, maintaining local significance only.



You might be interested in
We want to implement a data link control protocol on a channel that has limited bandwidth and high error rate. On the other hand
Korolek [52]

Answer:

Selective Repeat protocols

Explanation:

It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.

If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.

But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.

6 0
3 years ago
Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense's front end
sweet [91]

Answer:

RainbowTables

Explanation:

RainbowTables is the best option when the cracker has limited time.

6 0
3 years ago
the central processing unit(CPU)is responsible for processing all information from program run by your computer.​
olasank [31]

Answer:

This is a true statement.

Further Explanation:

The CPU is technically the brain of a computer, containing all the circuitry required to process input, store data, and output results.

3 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
2 years ago
Microsoft excel is a ____application.
gavmur [86]
<span>Microsoft Excel is a spreadsheet developed by Microsoft for Windows, Mac OS X, Android and iOS.</span>
4 0
3 years ago
Other questions:
  • We will pass you 2 inputsan list of numbersa number, N, to look forYour job is to loop through the list and find the number spec
    12·1 answer
  • When was internet created in which year​
    13·2 answers
  • What allows users to connect via the Internet to its private network?
    11·2 answers
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    6·2 answers
  • Demographics and psychographics influence database marketing.<br><br><br> False<br><br> True
    7·1 answer
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
  • PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO
    14·1 answer
  • Which one causes concerns for institutions or businesses when they are collected stores and they aren’t secured properly?
    5·1 answer
  • What are the parts of a file?​
    9·1 answer
  • Question #1
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!