1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paladinen [302]
4 years ago
15

What entity created the open systems interconnection (osi) seven-layer model?

Computers and Technology
1 answer:
sweet [91]4 years ago
8 0
The ISO developed the 7 layer OSI model.
You might be interested in
24
gogolik [260]

Answer:

OC

Explanation:

I am not so sure about this though as I am not familiar with a webmail service. I hope this helped. Sorry, if it wasn't much of an help though

7 0
3 years ago
Read 2 more answers
Is number 1 correct​
Nutka1998 [239]

Answer:

Yes, number 1 is correct

Explanation:

8 0
3 years ago
Read 2 more answers
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
RideAnS [48]

Answer:

True.

Explanation:

In generating PRNGs, several specific types of crypto algorithms will be widely will use: linear cipher block, nonlinear ciphers, as well as hash methods and authorization instructions in messages. So, that's why the following scenario is true about the cryptographic algorithms because this is a collection of several excellently defined however complicated mathematics techniques for encoding or decoding information.

7 0
3 years ago
I cant see the answers because the stars are blocking them how can this be fixed
viva [34]

I'm sorry whats your question?

7 0
3 years ago
What is usually written in block style with the body text along the left margin.
Effectus [21]
A Business letter

6ix9ine
4 0
3 years ago
Other questions:
  • When is a wired connection preferred to a wireless connection by an end-user device?
    11·1 answer
  • Which piece of personal information do websites often require users to enter?
    6·2 answers
  • What term is used for a seemingly harmless program that has malicious code hidden inside?
    9·1 answer
  • CNG and gasoline-powered vehicles use the same internal combustion engine, but different fuel types. A) True B) False
    8·2 answers
  • What is a good range for CPU usage to be considered running well?
    15·1 answer
  • On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!
    10·1 answer
  • Why can't we sign up to brainly.com??????????????????
    12·1 answer
  • An administrator has been asked to update a flow that was created as part of a recent update. When the administrator opens the f
    14·1 answer
  • Problem: Write the Python code of a program called ComputeSquare that asks the user to enter the length of the side of the squar
    10·1 answer
  • Describe the method used by operating systems to differentiate between TCP connections.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!