1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
5

Hilda is troubleshooting a problem with the encryption of data. at which layer of the osi reference model is she working?

Computers and Technology
1 answer:
Fittoniya [83]3 years ago
7 0
The la<span>yer of the osi reference model that hilda is currently working on is: presentation
On Osi reference model, the presentation layer is created </span><span>to take care of the semantics and syntax of the information exchanged between two systems. The presentation layer will make sure that the receiver of the information will understand the data that being given.</span>
You might be interested in
An ellipse (three dots) following a menu item indicates that
Mariulka [41]

Answer:

Correct answer is

clicking on item will display a dailogbox/ more options

Explanation:

In web site menus have limited space.To add all items menus are grouped in categories and only category names are shown while there subsets are displayed in a drop down list upon hovering on them.

Some time designer user three dot indication which indicates there are more options available in a hidden side bar or dialog menu which opens upon clicking the ellipse.

3 0
3 years ago
Read 2 more answers
The _____ lists all of the fields that are available in a table.
crimeas [40]

What are the other options? Is this multiple choice or just fill in the blank

7 0
4 years ago
Can you explain the GB part. The gigibiyte part, what does that mean when usung wifi off of a hotspot?
REY [17]
From how I interpret it, it means that you can use X amount of megabytes or gigabytes within the billing cycle. For example, if you went with $100/2 months for 10GB of data, you would pay $100 every 2 months, and within those 2 months you would be able to use 10 gigabytes of data. It looks like the average smartphone user uses about 3GB of data per month, but you'll have to gauge it based on what you normally use.
7 0
3 years ago
What is the difference between basic auth and oauth.
ratelena [41]

Answer:

Basic auth is an authentication where username and password are sent with an HTTP request unencrypted (just base64 encoded).

OAuth is a scheme whereby you perform a login at an IAM server, which gets you a token, and then you provide the token with requests to another server.

4 0
2 years ago
Chip is examining data regarding the age at which people got married. He notices that in a number of cases people were reported
erastova [34]

Answer:

Data Cleaning

Explanation:

According to my research on data management, I can say that based on the information provided within the question what Chip is doing is an example of Data Cleaning. This term refers to the process of finding errors within sets of data and correcting or removing them from the set, or even the database entirely, this includes any data that may be inaccurate to completely wrong.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
4 years ago
Other questions:
  • Some personal computer manufacturers provide a hard disk configuration that connects multiple smaller disks into a single unit t
    6·1 answer
  • Describe an algorithm that, given n integers in range 0 to k, preprocesses its input and then answers any query about how many o
    15·1 answer
  • What is the purpose of the New Window command?
    7·2 answers
  • 2. How do cell phone users stay connected to the network as users move between cells?
    10·1 answer
  • To use   ( 2 complement ) answer it (101101)2 – (1100)2 =   (                    )2
    12·1 answer
  • PLEASE HELP
    7·2 answers
  • What is the primary purpose of the destination address?
    9·1 answer
  • Write a paragraph on 'Save Earth Save Life.'​
    12·1 answer
  • Which cyber protection condition establishes a protection.
    12·1 answer
  • Write a function that receives a StaticArray and returns an integer that describes whether the array is sorted. The method must
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!