1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
12

John, the Network Administrator of XYZ Corporation, is interested in changing the format of text from American Standard Code for

Information Interchange (ASCII) to Extended Binary Code Decimal Interchange Code (EBCDIC). In addition, his IT manager requested that all sensitive and confidential information on their servers should be protected by applying the appropriate encryption. What OSI reference model layer is responsible for data format such as encryption?
A. Data-Link Layer (Layer 2)
B. Presentation Layer (Layer 6)
C. Transport Layer (Layer 4)
D. Session Layer (Layer 5)
Computers and Technology
1 answer:
MAXImum [283]3 years ago
3 0

Answer:

B. Presentation Layer (Layer 6)

Explanation:

In the OSI model, the presentation layer is responsible for the formatting, encryption, and decryption of data and then presenting it to the application layer for further processing. The syntax between two systems may be different, the role of the presentation layer is to format data such that the two systems can communicate with each other. At the presentation layer, an American Standard Code for Information Interchange ASCII coded text file can be converted to Extended Binary Code Decimal Interchange Code (EBCDIC).

You might be interested in
Universal Containers offers a variety of products that are comparable to products from other companies. Sales representatives re
-Dominant- [34]

Answer:

The System Administrator should implement a Competitors  on the opportunity Page Layout

Explanation:

<em>Because, it allows basic information to be captured about the competitors on each opportunity. Besides it qualifies opportunities based on historic success against competitors, tailors the sales approach based on the competitors each deal and consistently increases win rates by learning what worked and what did not.</em>

5 0
3 years ago
The leading membranophone in "Kan andi ghazal" is the ________. (If you can not access the audio file here, please go to modules
ICE Princess25 [194]

Answer:

Tabl Baladi

Explanation:

The Tabl Baladi is a large drum with wood frame and heavy skin on both sides. It is hung by a belt around the player's shoulder is and played with two sticks: the thick one is for the dum sound played with the dominant hand, and the thin stick is for the tak sound played with the other hand.

It is mostly used in classical Arab (Middle Eastern) music. Kan Andi Ghazal is a song by the Lebanese musician Wael Jassar.

5 0
4 years ago
What is authentication?
Savatey [412]

Answer:

C

Explanation:

I believe that's the answer if it's not sorry

8 0
3 years ago
IDPSs can also help the organization protect its assets when its networks and systems are still exposed to ____________________
miss Akunina [59]

Answer:

The answer is "Known"

Explanation:

The network security tool also referred to as the IDPSs or Network Prevention Solution (NDPS), all organizations typically use IDPs to assess security concerns, detect security threats.  

  • It avoid breaches of security protocols by individuals, and it may also assist the company in protecting its assets.  
  • When its networks and systems either face security flaws or unable to respond to an evolving environment of risks, and other choices were incorrect because it can't be defined in the question.
3 0
3 years ago
You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
adelina 88 [10]

Answer: d. incremental backup

Explanation:

In incremental backup it copies only the files that have changed since the last full backup. It does not backup all the files just like the full backup. it however backup those copies into the  system which has changed since the last backup.

In doing  so it just increases the efficiency and performance of the backup procedure. This process is basically preferred when the amount of file to be backup is huge and there is not enough time to do a full backup.

Increment backup also use less disk space.

Cloud backup uses most increment backup for its application.

6 0
4 years ago
Other questions:
  • 7. Write a program in C to display the string "ARRAY" in the following format : A AR ARR ARRA ARRAY
    5·1 answer
  • Which structure is sometimes called the "gateway to memory"?
    14·1 answer
  • Define a function below called increase_elements_by_x, which takes two arguments - a list of numbers and a single positive numbe
    13·1 answer
  • To activate a wizard to help in creating combo boxes and command buttons, make sure the ____ button is selected
    6·1 answer
  • You can change the color of the value of a cell or the background color of the cell but not both.
    5·2 answers
  • What is an LMS and how is it used?
    8·1 answer
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • Design and implement a program (name it Youth) that reads from the user an integer values repressing age (say, age). The program
    6·1 answer
  • Consider the following MARIE Code: 100 If, Load X /Load the first value 101 Subt Y /Subtract the value of Y, store result in AC
    8·1 answer
  • Which of the following is NOT an example of application software?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!