1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
14

Provide a brief, high-level description of how the Internet’s connection-oriented service provides reliable transport.

Computers and Technology
1 answer:
mario62 [17]3 years ago
7 0

Answer:

  Connection-oriented is the method which is implemented in the transport and data link layer. It is basically depend upon the physical connection in the network system.

Transmission control protocol (TCP) is the connection oriented and user datagram protocol (UDP) is the connection less network transport layer. The TCP and UDP both are operate in the internet protocol (IP).

It basically require connection and it can be establish before sending data. This is also known as reliable network connection service. The connection oriented service establish connection between the different connection terminal before sending any data or information. It can easily handle traffic efficiently.

You might be interested in
In a non-price rationing system, consumers receive goods and services first-come, first served. Give me an example of a time whe
Anna35 [415]

When someone may be giving away something for free.

7 0
3 years ago
3.4 code practice question 2 edhesive
Gelneren [198K]
???????????????????
7 0
3 years ago
Read 2 more answers
There are various risks from attacks on wi-fi networks. These include all of the following except _____.
Mariulka [41]

There are various risks from attacks on wi-fi networks. These include all of the following except creating option d: malware.

<h3>What is malware?</h3>

This is said to be any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software.

Note that Computer viruses, worms, as well as Trojan horses, ransomware, and spyware are said to be examples of malware.

Lastly, Malware, often seen as malicious software, is a general word for any program or piece of code written with the intention of causing harm to a computer, network, or server.

Learn more about malware from

brainly.com/question/399317
#SPJ1

See options below

Blackbox

Acting

Miracle

Malware

5 0
1 year ago
The head of small organization wants to install a network so that all the employees of different department can share various re
Firdavs [7]

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

4 0
3 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
Other questions:
  • What is an advantage of using a meta-search engine?
    14·1 answer
  • The working window of a presentation is the _____.
    6·2 answers
  • 1) Why is angle of view important? What are some of the ways that you can do this?
    6·1 answer
  • WILL GIVE BRAINLIEST!!!!!!!!
    9·1 answer
  • Which of the following best describes professional behavior in the IT field?
    6·1 answer
  • You decide to store data in the user's browser in order to reduce the amount of data that must be downloaded. What is this proce
    11·1 answer
  • :(.
    5·2 answers
  • Choose the item which best describes the free frame list. 1. a per process data structure of available physical memory 2. a glob
    7·1 answer
  • 2.13.4 Colorful Caterpillarhel ????
    15·1 answer
  • Effectiveness of thicker,biodegradable plastic shopping bags
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!