1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
3 years ago
13

If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? 1 2 5

6
Computers and Technology
1 answer:
Fantom [35]3 years ago
4 0

Answer: 5 Frames

Explanation: When the data packet is transferred from sender to receiver , it forms frame.If there are five networks through which the data packets travels then there are five frames as well because packet moves one by one from every frame.

Other options are incorrect because the number of frame in network from source to destination will be equal to the number of networks .So, it cannot be 1 ,2 and 6 frames.Thus the correct option is 5 frames.

You might be interested in
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
Select the correct answer.
BigorU [14]

Answer:

A

Explanation:

This Information involves informing the young youth about adult and mature life

5 0
3 years ago
Read 2 more answers
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
Scorpion4ik [409]

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

4 0
3 years ago
Complete the concept map on computer as outlined below​
USPshnik [31]

Answer:

Here is your answer.

have a great day

6 0
3 years ago
What is a power surge?
Damm [24]
D. A spike of electricity. They are fast and have a short duration.
4 0
3 years ago
Other questions:
  • ____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user,
    10·1 answer
  • What is a good voltage measurement on a brand new, 6 volt golf cart deep cycle battery after the first charging?
    10·1 answer
  • Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
    12·2 answers
  • N, or central processing unit, is also known as the
    10·2 answers
  • 7.2 need help plzs 15 points
    13·1 answer
  • Difference between private and confidential data?​
    5·1 answer
  • Who's hype for Halo Infinite?
    11·2 answers
  • Which tab should a user click to access the Page Borders feature of Word?
    13·2 answers
  • Define technical writing. The proposal introduces the ……. (5 Mark)
    9·1 answer
  • Which computers accuracy is much higher(i.e.analog &amp; digital )​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!