Answer:
C is the correct answer to your question
Answer:
A
Explanation:
A hacker searching for open ports denotes vulnerability of computer (to hacking).
Cheers
Answer: Computers as target
Explanation:
Whenever an authorized access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.
Answer: As the conventional etiquette, which lays out rules of ethics in social contexts, the purpose of netiquette is to help create and sustain a friendly, relaxed and productive atmosphere for online contact, as well as to avoid putting pressure on the system and creating tension between users.
Explanation:
Answer:
Data link layer enables the receiving node to send an acknowledgement.
Explanation:
The data link has following function;
1 it send the acknowledgement to the node because for the reliable transmission.
2.Data link layer provides the interface to the network layer.
3.it regulate the flow of data.
4.It control the transmission error.
The important function of data link layer it created packets of the data to send the packets in guarantee manner for giving the acknowledgement to the node that data is received successfully.