1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
9

The two fundamental approaches to moving data through a network of links and switches are

Computers and Technology
1 answer:
olga55 [171]3 years ago
6 0

Answer:Packet and circuit switching

Explanation: Packet switching is the technique through which the data is sent from the source to destination in the form of data packets on dynamic path.It is the time of connectionless switching and route generates for each packet.

Circuit switching is the switching technique having connected path for the sending and receiving of the data.They have well defined and established path for the transmission of data.

Other options are incorrect because they define the terms that are associated with the data that gets transmitted like bandwidth,transmission rate ,packet etc. These options are not the way in which data transmitted or switched.Thus, the correct option is packet and circuit switching.

You might be interested in
Write the use of the Goto statement with the help of an example.
kogti [31]
Sorry for this but to be honest we do t get taught this in the school I go to sorry
3 0
3 years ago
How are water resources and air adversely affected by environmental degardation?​
Nonamiya [84]

Answer:

Environmental degradation is one of the ten threats officially cautioned by the High-level Panel on Threats, Challenges and Change of the United Nations. The United Nations International Strategy for Disaster Reduction defines environmental degradation as "the reduction of the capacity of the environment to meet social and ecological objectives, and needs".[4] Environmental degradation comes in many types. When natural habitats are destroyed or natural resources are depleted, the environment is degraded. Efforts to counteract this problem include environmental protection and environmental resources management.

There are many examples of environmental degradation throughout the world. A recent example is the 2019 Amazon rainforest wildfires. The Amazon makes up 60% of all rainforests. It is the earth's lungs and with it getting destroyed is posing a huge threat to the environment and the whole world. The effects of the deforestation will pose major impacts on the world around us. The constant cutting down of trees is getting rid of our oxygen supply as well as the absorption of co2. With the continuation of deforestation we will have less available oxygen in the world which could have detrimental effects on human health. An alternate issue that results from this is the overconsumption and waste of the paper products that come from those trees. The waste it typically produces does not get recycled, therefore, immense amount of waste is created. An additional harmful result from this is the degradation of the soil. The constant deforestation causes the soil to become less nutrient which will make it harder to be used again.

Explanation:

Environmental degradation is one of the ten threats officially cautioned by the High-level Panel on Threats, Challenges and Change of the United Nations. The United Nations International Strategy for Disaster Reduction defines environmental degradation as "the reduction of the capacity of the environment to meet social and ecological objectives, and needs".[4] Environmental degradation comes in many types. When natural habitats are destroyed or natural resources are depleted, the environment is degraded. Efforts to counteract this problem include environmental protection and environmental resources management.

There are many examples of environmental degradation throughout the world. A recent example is the 2019 Amazon rainforest wildfires. The Amazon makes up 60% of all rainforests. It is the earth's lungs and with it getting destroyed is posing a huge threat to the environment and the whole world. The effects of the deforestation will pose major impacts on the world around us. The constant cutting down of trees is getting rid of our oxygen supply as well as the absorption of co2. With the continuation of deforestation we will have less available oxygen in the world which could have detrimental effects on human health. An alternate issue that results from this is the overconsumption and waste of the paper products that come from those trees. The waste it typically produces does not get recycled, therefore, immense amount of waste is created. An additional harmful result from this is the degradation of the soil. The constant deforestation causes the soil to become less nutrient which will make it harder to be used again.

4 0
3 years ago
A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode
sweet-ann [11.9K]

Answer:

yoooo nba BAD BAD

Explanation:

3 0
3 years ago
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and det
AleksandrR [38]

Answer:

See explaination

Explanation:

Wireless Security:

In a bid to examine the network you can use ipconfig /all command in windows or in the event where you are a linux user type in ifconfig to view all the configuration details of your network such as

indows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : example.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . : Yes

Ethernet adapter Local Area Connection:- - - - - -

Connection-specific DNS Suffix . :- - - - - -

Description . . . . . . . . . . : Intel 68540-Based PCI Express Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-AA-BC-CA-8F

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe65::ab56:ccb9:320c:524d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.45.111(Preferred)

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

Note: If you want to deeply examine the your network and to find security model go with Wireshark application.It will help you to capture the data packets easily using GUI.Also it will provide other details like transmission control protocols,etc.

To take your network to highest level i.e. to make it more secure you can use:

1.Firewalls like application gateways,packet filtering,hybrid systems.

2.Crypto cable routers

3.Virtual private networks, etc.

Estimation of cost and the time to increase the level is solely depends on the type of the architecture you want to use for the network building structure.Also the size of the network will be responsible for the cost and time.

In case of any attack on your computer it depends on the size of the data on the computer disc and the bandwidth of the network to which your computer is connected to replace all data. The faster the bandwidth of the network,faster the data replacement rate.

3 0
3 years ago
Other questions:
  • The magnavox odyssey was a commercial success
    13·1 answer
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • What is the binding time for the following in C/C++ program. Explain. a. The location of memory of a local variable in a functio
    9·1 answer
  • A presentation has bullet points that move. The presenter wants to use these bullet points in several other places in the presen
    6·1 answer
  • Solve the recurrence relation.<br> S(1)=1<br> S(n)= S(n-1)+(2n-1) for n&gt;=2
    13·1 answer
  • How is a technical certificate like a computer-related associate degree?
    12·2 answers
  • 1. What is JavaScript?
    15·1 answer
  • Which of the following changes the features (e.g., thickness of the line, shadow, 3-D effect, single or double, etc.) of the bor
    14·1 answer
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    10·1 answer
  • What will be the result from running the following program?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!