1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
5

Hilda is troubleshooting a problem with the encryption of data. at which layer of the osi reference model is she working?

Computers and Technology
1 answer:
Fittoniya [83]3 years ago
7 0
The la<span>yer of the osi reference model that hilda is currently working on is: presentation
On Osi reference model, the presentation layer is created </span><span>to take care of the semantics and syntax of the information exchanged between two systems. The presentation layer will make sure that the receiver of the information will understand the data that being given.</span>
You might be interested in
The best way to ensure the accuracy and safety of your accounts is to:
Gekata [30.6K]
Use symbols and a different password for each one

6 0
3 years ago
Fill in the blank with the correct response.<br> A _<br> is an unknown network.
alexgriva [62]

Answer:

ip address

Explanation:

please mark brainliest

7 0
3 years ago
Which are the benefits of leveraging web technologies?
allsm [11]

Lower cost - You can leverage web technologies like FB and Google which allow you to advertise and reach billions of users relying on their services at a very low cost as compared to other mediums.  

Security – Data stored with web technology companies offers more security because it is stored in huge data centers that have high-end protection

Increase business efficiency – Web technologies can increase business efficiency and unlock value in your business functions. They can reduce time, provide critical analytics and help your business grow.

4 0
4 years ago
Read 2 more answers
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
The steps for moving data from one cell to another are _____.
swat32
The steps for moving data from one cell to another are : 
Select the cell by pointing on the cell clicking it, and dragging it to the new cell. <span>To move a cell or range of cells, point to the border of the selection. When the pointer becomes a move pointer , drag the cell or range of cells to another location.</span>
3 0
3 years ago
Other questions:
  • Which if the following is an example of tangible property?
    7·1 answer
  • What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?
    15·1 answer
  • Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastName and whos
    12·1 answer
  • What is the importance of the query object why do we need such an object?
    5·1 answer
  • What is the best way to get the most out of the box?
    14·2 answers
  • JAVA
    13·1 answer
  • How did New York Governor Hugh Carey handle Sostre’s situation?
    9·2 answers
  • Write a function solution that, given an integer N, returns the maximum possible
    8·1 answer
  • An application is getting downloaded, the total size is 52GB. So the speed of the WiFi is like.. 10mb per second, so the questio
    12·1 answer
  • Which terms would be found in search for "Mo*”? Check all that apply.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!