1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
3 years ago
15

Suppose the file is sent continuously as one big message. how long does it take to send the file, assuming it is sent continuous

ly?
Computers and Technology
1 answer:
pashok25 [27]3 years ago
4 0
I'm sorry but this doesn't make sense.
You might be interested in
What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
vaieri [72.5K]

The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

<h3>What is replay attacks in security?</h3>

A replay attack is known to be a kind of security attack that is known to be done if  or when a cybercriminal is said to spy on a secure network communication.

Note that by this, they tend to intercepts the message  and then they can fraudulently delays or as well as resends it to misdirect the receiver into carrying out the thing that  the hacker wants.

Hence, The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

learn more about  digital data from

brainly.com/question/28346439

#SPJ1

8 0
1 year ago
How to write my name in binary code ? Rivas
wel

Your name in binary would be "01010010 01101001 01110110 01100001 01110011"

3 0
2 years ago
Read 2 more answers
Below is a 4-bit down-counter. What is the largest number of the counter if the initial state Q3Q2Q1Q0=0011? (D3 and Q3 are MSB,
icang [17]

Answer:

The correct answer is option (A) 1111

Explanation:

For initial state Q3Q2Q1Q0=0011,

For load = 1 and count = 1 the count is as follows;

1100

1101

1110

1111

Therefore, the maximum count value is 1111

3 0
3 years ago
How are engineers are related to technology
vichka [17]
Engineering is the application of knowledge and technology is the body of knowledge:)
4 0
3 years ago
If wearing protective gloves, there's no need to wash your hands after exposure to blood.
Nataliya [291]

Answer:

No, still wash hands

Explanation:

5 0
2 years ago
Other questions:
  • For film editors, which task comes last in their workflow pattern?
    12·2 answers
  • _____________ is a service that provides access to hardware resources available over the Internet.
    11·1 answer
  • Anti-bullying laws in most states are designed to provide
    14·2 answers
  • What is the use of pecil icon
    11·2 answers
  • Which of the following is considered information?
    6·2 answers
  • If you want to copy text formatting from one area of your document to another area, _____.
    5·2 answers
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • Which paragraph from the article helps explain what “engaged” is referring to?
    9·1 answer
  • This is a program that calculates information about orders of shirts and pants. All orders have a quantity and a color. Write a
    7·1 answer
  • Is the trust necessary to use an emerging technology platform? why?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!