1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
11

What are the layers in the internet protocol stack? what are the principle responsibilities of each of these layers?

Computers and Technology
1 answer:
Andrew [12]3 years ago
3 0
1: Application
2: Presentation
3:Session
4: Transport
5:Network 
6: Data link 
7: Physical

Application is a Interface Layer and responsible Layer
<span />
You might be interested in
Write a method void Print(int LastNumber, int numbersPerLine) that receives two integers
marysya [2.9K]

Answer:

Code is in the attached screenshot.

Explanation:

Assumed it was written in Java based on your other question asked.

7 0
3 years ago
Ftp is a _________ that is utilized to copy and manage files over the internet
Marizza181 [45]
<span>Ftp is a network protocol that is utilized to copy and manage files over the internet.  </span>FTP<span> is widely </span>used<span> for transferring </span>files<span> between computers </span>over<span> a TCP/IP-based network, such as the </span>Internet<span>.</span>
5 0
3 years ago
Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp
MA_775_DIABLO [31]

In excel spreadsheets, Sidney need to consider specifying relationships between the information you have stored in your spreadsheets when creating formulas. The elements that will help you understand using spreadsheet are the constants, operators, references and functions. This will enable her to use the formulas, without hassle in spreadsheets.

3 0
3 years ago
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
mars1129 [50]

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

7 0
3 years ago
why might you want to use the send to compressed (zipped) folder command before sending four pictures to a friend via email
IceJOKER [234]

It's easier to send the files that way because you don't have to attach them individually, and then your friend won't have to download them individually - they can just download the zip package and have all four right at their disposal.

6 0
3 years ago
Other questions:
  • Gateway drugs are normally not addictive
    15·2 answers
  • Which device or software application detects errors in system configurations?
    8·1 answer
  • What is output by the following?<br><br>print (type("95"))
    13·1 answer
  • How could you insert a new row between rows 20 and 21?
    7·2 answers
  • A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
    9·1 answer
  • Do like TikTok??????
    14·2 answers
  • Kayla wants to know whether she should set her network up as a WAN or a LAN. What are the three questions you would ask her, and
    11·1 answer
  • Directions: Arrange the jumbled letters to make/form a new word. Then give a
    12·1 answer
  • One way to initiate a file download from a web page is to
    8·1 answer
  • Why does Homework exist? Why is it so important?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!