Answer: input
Explanation:
The computer function that accepts data from the input devices and sends it to the computer processor is refered to as the input function.
The input device is referred to as a hardware device which is used in sending data to a computer. Some examples of input devices that we have keyboard, mouse etc.
Answer: IV attack
Explanation:
IV attack is stand for the initialization vector attack that are used over the wireless network an it is used as the encrypted packet during the process of transmission. An initialization vector attack basically attempts for exploits for exposing the encrypted information.
According to the question, the IV attack is basically used with the stream cipher for exposing the information wirelessly.
The initialization vector is one of the arbitrary number that are used in the for of secret key in the system and it helps in prevent the duplicate character in ciperhtext.
Therefore, IV attack is the correct answer.
Answer:
Option(b) and Option(c) is the correct answer for the given question.
Explanation:
TCP stands for transmission control protocol, In the TCP protocol firstly it maintains the connection between the sender and the receiver. The receiver always gives an acknowledgment to the sender when it receives the information that's why TCP is reliable protocol it is found in TCP/IP application layer protocols
UDP stands for user datagram protocol, In the UDP protocol, it does not maintain the connection between the sender and the receiver. The receiver does not give any acknowledgment to the sender that why UDP is not a reliable protocol . it is also found in the TCP/IP application layer protocols
- In the option(a) IP is found in the network layer that why this option is incorrect.
- In the option(d) FTP is found in the application layer thats why this option is incorrect .
Hence TCP and UDP are TCP/IP application layer protocols
I don’t think so. Not sure though
Yes I believe so
It should be acked up on the hard drive