1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
3 years ago
12

wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?

Computers and Technology
1 answer:
Helen [10]3 years ago
6 0

Answer: The 5 different layers in the IP stack are as follows:

1. Physical Layer

2. Data Link Layer

3. Network Layer

4. Transport Layer

5. Application Layer

Explanation:

The functions of the different layers are:

The physical layer is concerned with transfer of bits  across the different nodes, The data link layer is concerned with transmission of frames with error detection and correction. The network layer is concerned with routing the packets across various nodes in the router. The transport layer deal with the implementation of protocols such as TCP and UDP. The Application layer host a numerous software applications such as  HTTP, SMTP for client server connections.

You might be interested in
Evidence left behind by participants or observers is an example of what kind of resource?
Natasha2012 [34]
The answer should be D
6 0
3 years ago
Read 2 more answers
Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices th
navik [9.2K]

Answer: (C) Ransomware

Explanation:

The ransomware is one of the type of malware software design which is used for blocking the user accessing unauthorized and also without paying money.

The most of the ransomware software encrypt the computer accessing and the files as they demand for the payment dues for again restoring the access.  

It also encrypt the user account and the information until the correct decrypt key are get entered into the system. So, according to the given situation, the ransomware attack are experienced in an organization.  

Therefore, Option (C) is correct.

4 0
3 years ago
Describe one difference and one similarity between science and pseudoscience.
irakobra [83]
A scientific experiment is repeatable. Pseudoscience makes claims that cannot be either confirmed or denied. Both seem to want to explain our experiences and broaden our understanding. Science, as a working method, employs basic principles such as objectivity and accuracy to establish a finding. It often also uses certain admitted assumptions about reality, assumptions that must eventually support themselves and be proven, or the resulting finding fails verification. Pseudoscience, however, uses invented modes of analysis which it pretends or professes meet the requirements of scientific method, but which in fact violate it's essential attributes. Many obvious examples of pseudoscience are easy to identify, but the more subtile and herefore more insidious and convincing cases.
6 0
3 years ago
You administer a Microsoft SQL Server database that supports a banking transaction management application. You need to retrieve
dusya [7]

Answer:

A, B

Explanation:

A. selects accountholder's ids and check them with those who don't have cities in BranchMaster table.

B. We can use both <em>NOT IN</em><em> </em> as well as <> operator for comparison so it selects accountholder's ids which are not in all of those account holders who have cities in BranchMaster.

5 0
3 years ago
An application with a 150 GB relational database runs on an EC2 Instance. While the application is used infrequently with small
kupik [55]

Answer:

the bandman is hered that mybaddba

4 0
3 years ago
Other questions:
  • Write a function: function solution(N); that, given a positive integer N, prints the consecutive numbers from 1 to N, each on a
    14·1 answer
  • Mass production usually uses an _______________ ____________ or production line technique.
    7·1 answer
  • A storyboard is an example of an implementation tool.<br><br> A.<br> True<br><br> B.<br> False
    8·2 answers
  • How do you use a Hard Drive
    5·2 answers
  • An application is to be written that would allow students to find out their GPA(double) and their total number of credits (an in
    15·1 answer
  • Are one of the greatest features of Photoshop that allow nondestructive editing of images.
    6·1 answer
  • What is segmentation and paging?
    12·1 answer
  • Do debit cards offer the highest level of fraud pretection?
    10·1 answer
  • How many people are in Siver, on the game Valorant?
    14·1 answer
  • How are the current and resistance related when the voltage of a circuit is constant?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!