Answer:
What’s up, I’m currently in this class, and I was wondering if it’s easy or hard?
Explanation:
Answer:
ASCII- Presentation layer
DDP- Network layer
Ethernet- Data Link Layer
NetBios- Session Layer
Telnet- Application Layer
PPP- Data Link Layer
UDP- Transport Layer
Explanation:
UDP is transport layer protocols and it is functional at the 4th layer in the OSI model below session and above the network layer.
Point-to-Point Protocol ensures authentication of connection, encryption of transmission, as well as compression. And it is part of the Data Link Layer.
Telnet is for operating remotely over a network and is part of the application layer.
NetBIOS stands for Network Basic Input and Output System. It allows the application on different computers to communicate with each other and is part of the session layer.
Ethernet is part of the Data Link Layer.
Datagram Delivery Protocol or the DDP is the network layer protocol used for routing purposes.
ASCII is part of the Presentation Layer.
Read more on Brainly.com - brainly.com/question/14607079#readmore
Explanation:
The Common names for computer-based information systems are management information, , decision support, and executive support systems.
<h3>What are computer based information system?</h3>
The Computer Based Information Systems (CBIS) is known to be way where there is processing of data system into a kind of good or better quality information.
Note that they help in decision-making, coordination etc., and as such it is made up of Common names such as management information, , decision support, and executive support systems.
Learn more about information systems from
brainly.com/question/14688347
Answer
Cyber Security professionals
Explanation
Cyber security professionals can help the company protect itself from hackers. They are experts who will install antivirus into the software used in the company to protect virus manipulation and prevent malware. They will further encrypt the websites of the company and reset the password of the computers into two-factor authentications to make the login requirements advanced.
Answer:
first off you need to take of the screws make sure its unpluged and you open up to see the mother bored
Explanation: