1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bond [772]
3 years ago
6

What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?

Computers and Technology
2 answers:
Aneli [31]3 years ago
7 0
<span>Some causes of the number of bytes on the wire exceeding the number of bytes being captured is that </span>not everything is being captured or that partial packets may be captured which could lead to incorrect analysis. If there are regularly more bytes on the wire than captured, then, it is possible that the computer on which Wireshark is running is not able to keep up with the interface.
dolphi86 [110]3 years ago
4 0

A difference between bytes on the wire and bytes captured can indicate that not everything is  being captured or that partial or malformed packets may be captured which could lead to  incorrect analysis. If there are regularly more bytes on the wire than captured it is possible that  the computer on which Wire shark is running is not able to keep up with the interface.

Learn more:

  • What is the ratio of 7,900 bytes to 3,900 bytes

        brainly.com/question/8840726

Keywords: bytes, wire, packets, wire shark

You might be interested in
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
An online apparel website aims to rank on top in the search engine results. Which technique will help the business list itself a
Alex

Answer:

A. using exclusive keywords such as "leather jacket" in an image

Explanation:

A. is the correct answer. This is because generic keywords are hard to be ranked for, as they are general for all. And using exclusive keywords like "while winter jacket" will do but if we use even better keywords like the leather jacket with image will work even better, as Google prefers the images, and as an example an infographic over an article. And it prefers a video over an image, and so forth. And never ever link to phishing websites, the Search engine will ban you.

8 0
4 years ago
Read 2 more answers
Marsha is working on a group project and needs to start putting together a slide presentation for the group. Two of her group me
Zigmanuir [339]

Answer:

Apple iWork.

Explanation:

Apple iWork would not work for whole group.

6 0
4 years ago
PLEASE HELP!! FIRST ANSWER WILL MARK AS BRAINLIEST!!!
3241004551 [841]

Use the "As an Outlook Contact" option.

0 0
3 years ago
Jenny is working on a laptop computer and has noticed that the computer is not running very fast. She looks and realizes that th
Ulleksa [173]

Answer:

1. She Should Order C. SO-DIMM DDR 3

2. a. Show him how to find System Summary data in the System Information utility in Windows and then do online research.

Explanation:

8 0
3 years ago
Other questions:
  • Explain how abstraction is used in a GPS system
    12·2 answers
  • Clifford visits a website that has a lot of multimedia content. He watches a few videos. However, some videos do not play. The b
    14·1 answer
  • Which of the following does NOT describe a node?
    10·2 answers
  • Describe what a structure is in a living thing?
    9·1 answer
  • When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
    15·1 answer
  • A ________ determines what cpus a system can use, what integrated ports the system can provide without use of third-party produc
    5·1 answer
  • Assuming that a user enters 5 as the age, what is the output of the following code snippet? int age = 0; Scanner in = new Scanne
    10·1 answer
  • Write a C program to calculate and display the coordinates of midpoint - M of a linesegment between two given points - say A and
    7·1 answer
  • What is the importance of charts and graphics in providing<br> information?
    15·1 answer
  • Write a program that computes how much each person in a group needs to pay (after tax and tip) when splitting the bill equally.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!