1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
3 years ago
12

wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?

Computers and Technology
1 answer:
Helen [10]3 years ago
6 0

Answer: The 5 different layers in the IP stack are as follows:

1. Physical Layer

2. Data Link Layer

3. Network Layer

4. Transport Layer

5. Application Layer

Explanation:

The functions of the different layers are:

The physical layer is concerned with transfer of bits  across the different nodes, The data link layer is concerned with transmission of frames with error detection and correction. The network layer is concerned with routing the packets across various nodes in the router. The transport layer deal with the implementation of protocols such as TCP and UDP. The Application layer host a numerous software applications such as  HTTP, SMTP for client server connections.

You might be interested in
When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on th
balu736 [363]

Answer:

Option D: Botnet

is the correct answer.

<h3>When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on the Internet, <u>Botnets </u>are responsible. </h3>

Explanation:

A Botnet can be taken as the combination of two words "robot" and "networks". Botnets are used in depicting the malicious content as the breach the network security. They are used for stealing data by Distributed Denial of Service attack (DDoS) and by sending spam to all other devices connected to a network. All this scheme is managed by the attacker itself.

All other listed options spread malicious data by some other means.

I hope it will help you!

4 0
3 years ago
Which of the following occurs during data cleansing?
Diano4ka-milaya [45]

Answer:c)Clean redundant customer data

Explanation:Data cleansing/cleaning is the activity for the elimination of the data which is not required for further use, corrupt, unnecessary etc by detecting it. The data that is being cleared is categorized by levels like irrelevant  data, incorrect data, inaccurate data, redundant data etc.

The data is eliminated by the method of correcting , modifying, reducing unnecessary parts,deleting, etc.Thus, the correct option is option(C).

5 0
4 years ago
What is the primary reason that organizations change their structure through downsizing, outsourcing, and offshoring as a means
sp2606 [1]

Answer:

Operating core is the primary reason that organizations change their structure through downsizing, outsourcing, and offshoring as a means of improving their operating efficiency

Explanation:

  • At the bottom of the organization is the operating core.
  • These are the people that do the basic work of producing the products or delivering the services.
  • In the simplest organizations, the operators are largely self-sufficient, coordinating through mutual adjustment.
  • In those organizations, there is almost nothing but operating core.
8 0
4 years ago
17. Ano ang tawag sa pahina ng Excel?
kompoz [17]

D

Explanation:

D.spread sheet

........,,............:-)

5 0
3 years ago
What is stand-alone LDAP server?
FinnZ [79.3K]

Answer:

A stand-alone LDAP server is defined as to remove the load from a server that does multi function tasks. It is more efficient when we use one or more LDAP configurations .

Light weight Directory Access Protocol (LDAP) is a client and server protocol used for accessing directory data. It  helps in reading and editing the directories over IP networks and runs directly over Transmission control protocol and internet protocol used simple string format for transferring of data.

8 0
3 years ago
Other questions:
  • An objective test or measurement that technology product evaluators use to compare two or more products is ____.
    12·1 answer
  • Is a type of software program used to write code and develop other
    9·1 answer
  • What keyboard shortcut keys selects cell A1
    12·1 answer
  • Why would a designer choose to use an isometric sketch rather than a perspective sketch to share their idea with a design team m
    14·1 answer
  • __________ has become a widely accepted evaluation standard for training and education related to the security of information sy
    5·1 answer
  • java Consider a class MotorBoat that represents motorboats. A motorboat has attributes for: The capacity of the fuel tank The am
    15·1 answer
  • Last bittttt of points
    8·1 answer
  • *
    6·2 answers
  • Why was CDR the most developed country in nepal. Highlight any six reasons​
    9·1 answer
  • which of the following is acomputer program that detects, prevents. and takes action sto deactivate or remove malicious programm
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!