1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
7

What are the differences in LAN and WAN and how they are used to Increase Cybersecurity

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
7 0

Answer:

Local Area Network(LAN):-It is a group of computers usually connected together in a small geographical area for example:-building,office,school etc.

The speed in a LAN is high upto 1000 mbps.

Wide Area Network(WAN):-The computer network which cover a large area.The internet can be a good example of WAN.It consists of LANs and MANs .

The speed is less than LAN upto 150 mbps.

SD-WAN can be used to increase cybersecurity in WANs.

There are different ways in which LAN is used to increase cybersecurity.for ex:-

There are different LANs for ex: wireless security enabled LAN,firewalls installed LAN etc.

The OSI model consists of 7 layers which are as following:-

  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application

While TCP/IP consists of less layers than OSI model which are as following:-

  1. Link
  2. Internet
  3. Transport
  4. Application

TCP(Transmission Control Protocol) is the main protocol that run in the layer 4.IP(Internet Protocol) runs under the layer 3.That's why it's named as TCP/IP suite.

You might be interested in
The main trade-off that all investors must consider is
Talja [164]
<span>The main trade-off that all investors must consider is Risk vs Return
In the end, all the techniques that implemented in investing process is aimed for nothing other than profit.
Current market trend dictates that potential return tend to be higher the riskier the investment is and vice versa.
</span>
3 0
3 years ago
Read 2 more answers
What do you mean by algorithm​
Snowcat [4.5K]

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7 0
3 years ago
Read 2 more answers
Both successors to C++, _____ , by Sun Microsystems, and _______, by rival MicroSoft, are very similar.
Tanzania [10]

Answer: Java and Forth

Explanation:

   C ++ and Java are comparatively similar language which are composed statically, unequivocally, and obviously. Both language are the object-oriented and planned with the semi-interpretation and run-time during the compilation of the time.

Both uses the curly braces and also they are very similar language as compared with c# and c. Both the successors in the C++ , java and sun micro-system are similar in terms of Microsoft.

 

8 0
3 years ago
Remi always works on several projects at a time. He has thousands of files saved on his computer. Yet he always seems to be able
astraxan [27]

Answer

the micmethod <-----made by myself

Explanation:

1. alphabetical order

2.put in empty folder

3.name folder after file put file in hard drive

4.a hard drive is also a usb

5.make hard drive into necklace and wear all the time

6. now u never lose it

4 0
3 years ago
I'm bor.ed so... here's my em.ail
Nataly [62]

Thank you for your email

6 0
3 years ago
Other questions:
  • What was the second phone?
    14·1 answer
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • Suppose you want to delete an existing file from within Word. What would you do? A. Click on the File button, choose Recent, ope
    9·1 answer
  • which of the following are used on cable trays to protect the cable insulation from direct sunlight? a. barrier strips b. solid
    5·1 answer
  • Two fingers are assigned to six letters each. What fingers are they?
    9·1 answer
  • What are the features of the Outline view in Word? Select three options.
    12·2 answers
  • It is possible to make the document larger for viewing small text.<br><br> True<br> False
    15·2 answers
  • The memory used by the CPU to temporarily hold data while processing is called _______. random access memory central processing
    5·1 answer
  • The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
    13·1 answer
  • What is the purpose of installing updates on your computer?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!