1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
6

Describe encryption at gateways in thePresentation layer of the OSI Reference Model

Computers and Technology
1 answer:
puteri [66]3 years ago
4 0

Answer:  

In the presentation layer of the OSI reference model provides a variety of coding and functions that can be applied in application layer data. Information send by the application layer are ensured by these functions. As, presentation layer is the important layer in the OSI reference model because it is responsible for important services like  data compression, data conversion, decryption and encryption.

Encryption at gateway is defined as, when the important data is first encrypted using protocol and then it is transferred in the network. And gateway re-director operates in the presentation layer.

You might be interested in
Basics AutoCare is a small auto service business with two locations in a Midwest (U.S.) city. The business is based on providing
kogti [31]

Answer:

The ER diagram for the auto service is shown in the attachment.

5 0
3 years ago
Write a code segment that displays the values of the integers x, y, and z on a single line, such that each value is right-justif
Elena L [17]

Answer:

x = int(input ("enter first number: "))

y = int(input ("enter second number: "))

z = int(input ("enter third number: "))

print('%6d %6d %6d' %(x,y,z))

Explanation:

Using python programming language we receive three integers variables (x,y,z) then using string formatting (%6) which specifies that the output should be right justified with a width of 6, the values are printed out.

3 0
3 years ago
Okay so I know this is a platform for assignments but I really need a tech expert... So I had a 16 GB SD card and because of eve
Masja [62]

I'm not too experienced with code including external memory, but i believe there was an error with the code mixing that either mixed lines of code up or got rid of code to save files onto your device. Try looking up code for the device, see if that helps at all.

6 0
3 years ago
In Microsoft word you can access the blank command from the mini toolbar
Softa [21]
Your answer would be:
<span>
In Microsoft Word you can access the </span><span>insert citation command from the mini toolbar.</span>
3 0
4 years ago
The FCFS algorithm is particularly troublesome for ____________.
Nina [5.8K]

Answer:

The correct option is (b) multiprogramming systems

The best I can explain: In a time sharing system, each user needs to get a share of the.... at regular intervals.

Explanation:

Don't forget to follow me thanks

8 0
2 years ago
Other questions:
  • Ryan is the operations manager for a national financial company. His company is in the process of creating a customer handbook.
    13·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • . Two blue armies are each poised on opposite hills preparing to attack a single red army in the valley. The red army can defeat
    5·1 answer
  • Examine the exhibit above. "Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub. Which of the following
    13·1 answer
  • Write a Python3 program to check if 3 user entered points on the coordinate plane creates a triangle or not. Your program needs
    12·1 answer
  • When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
    8·1 answer
  • What is the difference between a computer’s RAM and its hard disk?
    13·2 answers
  • Which of the following is an example of an incremented sequence?
    13·1 answer
  • Calculate the time complexity for the following function in terms of Big O notation. Explain your answer.
    13·1 answer
  • How many ways are used to insert an image from file?koi h kya​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!