1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
3 years ago
14

Tonya is working with a team of subject matter experts to diagnose a problem with her system. The experts determine that the pro

blem likely resides at the Presentation Layer of the Open Systems Interconnection (OSI) model. Which technology is the most likely suspect?
Computers and Technology
1 answer:
Licemer1 [7]3 years ago
5 0

Answer:

The answer of the following question is Encryption.

Explanation:

Encryption is the second layer of the OSI Layer. It helps reduce the maintenance charges and offload complexity.

Encryption has presents in layer 3 and layer 4 which is IPSec in layer 3 and SSL, TSL in layer 4. of OSI Model.

<u>Note</u>- Only the Encryption can protect the data itself

You might be interested in
HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol inclu
frutty [35]

Answer:

A switch statement is a set of different outputs depending on the number of criteria asked to follow.

Given an integer number as a variable status, the algorithm would state as the following:

       int num

       switch (num) {

           case 200:

               printf(OK);

               break;

           case 403:

               printf(Fobidden);

               break;

           case 404:

               printf(Not Found);

               break;

           case 500:

               printf(Server Error);

               break;

           default:

               printf(Not a proper value);

               break;

       }

Depends on the value of hte variable "num", it will fall in one of the options above. If the variable has a different value that doesn't fit in any of the options above, it will prompt the default message.

4 0
3 years ago
HI! THIS IS THE PERSON FROM EARLIER WHO HAD PROBLEMS WITH THEIR PASSWORD
photoshop1234 [79]

Answer:

I dont know anything abt that

Explanation:

7 0
3 years ago
How many frequencies does a full-duplex qam-64 modem use?
Vsevolod [243]

The answer is 2 frequencies.

A Full-Duplex QAM 64 K Modem uses two frequencies. One frequency is used for upstream and the other for downstream. A variety of common QAM forms are available and include, 16 QAM, 32 QAM, 64 QAM, and 256 QAM. For example, for domestic broadcast use, 64 and 256 QAM are used for cable modem and digital cable TV. The modulation scheme for this modem uses both amplitude and phase.

8 0
4 years ago
Read 2 more answers
Go to the Subset tab, which gives a subset of randomly chosen data from the first tab. Go to your Math Tools and open the Graph
Karo-lina-s [1.5K]

A linear regression model is used to show the relationship between variables on a scatter plot

The equation of the linear regression model is: \^y = 1.56\^x + 1.29 and the correlation coefficient is 0.8034

<h3>How to determine the equation of the linear regression</h3>

The question is incomplete. So, I will make use of a dataset that has the following calculation summary (from a graphing calculator)

  • Sum of X = 45
  • Sum of Y = 83
  • Mean X = 4.5
  • Mean Y = 8.3
  • Sum of squares (SSX) = 82.5
  • Sum of products (SP) = 128.5
  • The value of R is 0.8034.

The equation of the linear regression model is:

\^y = 1.56\^x + 1.29

See attachment for the scatter plot

Read more about linear regression model at:

brainly.com/question/26347582

5 0
2 years ago
Which degree is usually required for librarians who manage library holdings and assist patrons with book, periodical, and comput
IRISSAK [1]

i think C

help from Russia


6 0
3 years ago
Read 2 more answers
Other questions:
  • Xavier loves to sing and hum, and he always has music softly playing while he studies. The learning style that best fits Xavier
    6·2 answers
  • Edhesive 4.1 question 1
    9·1 answer
  • Mai has recently created her own e-mail account. Her father gave her permission to e-mail her friends and family but warned her
    11·2 answers
  • Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first segment has sequence number 90; th
    8·2 answers
  • Write a repetition statement that outputs the numbers 45 , 51 , . . . , 165 . That is, all of the multiples of 6 in increasing o
    7·1 answer
  • Daniel owns a construction company that builds homes. To help his customers visualize the types of homes he can build for them,
    6·1 answer
  • Which steps do you follow to create a graph?
    5·2 answers
  • Write a function findWithinThreshold that identifies the elements of a given array that are inside a threshold value. Takes the
    13·1 answer
  • What is the default return type of a method in Java language?
    9·2 answers
  • Add this in binary numbers . (1100011+11111+111) ​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!