1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
3 years ago
13

If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? 1 2 5

6
Computers and Technology
1 answer:
Fantom [35]3 years ago
4 0

Answer: 5 Frames

Explanation: When the data packet is transferred from sender to receiver , it forms frame.If there are five networks through which the data packets travels then there are five frames as well because packet moves one by one from every frame.

Other options are incorrect because the number of frame in network from source to destination will be equal to the number of networks .So, it cannot be 1 ,2 and 6 frames.Thus the correct option is 5 frames.

You might be interested in
Why should ERP architecture include a discussion on organizational structure, business processes, and people, instead of just in
galben [10]

Answer:

Information technology is not the only focus when implementing ERP. It is of utmost importance for ERP to also focus on budget, business processes, people, business requirements and other areas. Employees must be communicated about changes intended in the future. The value of a system such as ERP is determined by how well its end-users use them. If ERP is made to focus on system architecture alone, the software might be successfully installed, but its implementation will be faulted. The installation of the ERP software might be easy, but the difficulties come in when changing the processes and introducing the new process to the people who will make use of the system. Change is something that is difficult to embrace, especially when they have no idea of the change. Hence, it becomes very important that when implementing ERP, business processes and people, and not just information technology and systems are consulted.

Explanation:

Information technology is not the only focus when implementing ERP. It is of utmost importance for ERP to also focus on budget, business processes, people, business requirements and other areas. Employees must be communicated about changes intended in the future. The value of a system such as ERP is determined by how well its end-users use them. If ERP is made to focus on system architecture alone, the software might be successfully installed, but its implementation will be faulted. The installation of the ERP software might be easy, but the difficulties come in when changing the processes and introducing the new process to the people who will make use of the system. Change is something that is difficult to embrace, especially when they have no idea of the change. Hence, it becomes very important that when implementing ERP, business processes and people, and not just information technology and systems are consulted.

4 0
3 years ago
Explain different users of computer in briefly?​
goldfiish [28.3K]

Answer:

The question is invalid; there are many types of computer user. Why on earth do you think there are five?

From the top of my head.

Casual- someone at home browsing the web, reading email.

IT Consultant. Advising people.

Software developer- writing software

Secretary - manages email for a company

Academic. Writing research papers.

Monitors. Monitor a computer system.

That’s six off the top of my head. There are probably a dozen more. So why do you think there are five?

3 0
2 years ago
Which of the following programs can open a bitmap file?
choli [55]
Windows paint can be used to open a bitmap file. Usually, when you have a picture, you can use that to edit it.
Also, on a side note, notepad is specifically used for html codes. 

Answer: Windows Paint
4 0
3 years ago
Read 2 more answers
Hello my friends i am trying to reboot my i phone 4 but i could not i tried many ways can u help me
g100num [7]

Answer:

Launch iCloud.com in the web browser on your PC.

After the page opens, enter the credentials; username and password.

On the screen, after you login, you’ll see all iDevices you’ve associated...

Choose "Erase operation" for devices you can’t log inside.

or

Connect your iPhone to a computer. If your iPhone gets hung up on the Apple logo or a solid-color screen when forcing it to restart, you can try using your PC or Mac to repair it without losing data. Start by connecting the iPhone to the computer using its charging cable.

2

Open Finder (Mac) or iTunes (PC). If you're using Mac Catalina or later, click the two-toned face on the Dock to launch Finder. If you have Windows or an earlier version of macOS, open iTunes from the Start menu or Applications folder. Locate your iPhone. If you're using Finder, click your iPhone's name in the left panel under "Locations." If you're using iTunes, click the button with an iPhone icon near the top-left corner of the app (to the right of the drop-down menu)

Explanation:

8 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Other questions:
  • Hudson has to maintain confidential college data in a workbook. He needs two team members to help him update data in the specifi
    7·2 answers
  • What protocol must be supported by routers in order to utilize remote assistance easy connect?
    10·1 answer
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • The command button to protect a document is part of the​.
    10·1 answer
  • 17. When an industrial electrical circuit requires a 220 VAC single phase power supply, the electric power supply circuit is nor
    7·1 answer
  • ¿Qué son las tecnologías modernas?
    6·1 answer
  • Which tab should a user click to access the Page Borders feature of Word?
    13·2 answers
  • EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.
    8·1 answer
  • GIF is example of raster image<br><br><br> RIGHT OR WRONG?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!