1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
13

Of the key reasons for creating organizational units which of the following is not one of them?

Computers and Technology
1 answer:
victus00 [196]3 years ago
5 0
There are no answrt choices it would be very helpful if you added them, then I could help you.
You might be interested in
A TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends another 160 bits of
Tatiana [17]

Answer:  2140 bits.

Explanation:

In order to traverse the first network, the Data Link Layer builds a frame, which adds a 24-bit header to the IP datagram, which has 1820 bits (1500 bits of TCP data + 160 bits of TCP Header + 160 bits of IP Header).

When the frame arrives to the router that interconnects the two networks, the network layer is informed that the MTU for the destination network, is 800 bits only.

So, as the maximum size for a frame in the destination network must be 800 bits (including the 24-bit header), the IP protocol must fragment the original 1820-bit datagram, in a way that any frame have at a maximum 800 bits.

So the IP datagram is fragmented in 3 datagrams, two of them with 760 bits each (600 from the TCP segment + 160 bits from the IP Header), and a last one, with 620 bits (460 bits from the TCP segment + 160 bits from the IP Header).

All the datagrams are completed adding the 24-bit header to build frames that traverse the destination network until they reach to the final destination.

After stripping the 24-bit header, the frames (that became datagrams), arrive to the network layer protocol, divided in 3 fragments, one of 620 bits and two of 760 bits, with a total of  2140 bits, which, once reassembled, will become the original 1500 bits + 160 bits header of the TCP segment, after stripping the IP headers.

6 0
3 years ago
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
When in global configuration mode, which steps are necessary to edit an ip address on an Ethernet interface?
katrin2010 [14]

Answer:

I. You should enter interface configuration mode.

II. Configure the IP address and subnet mask.

Explanation:

A node refers to the physical device that make up a network and are capable of sending, receiving, creating and storing data in communication.

Some examples of network nodes are modem, hubs, computer, switches, phone and printers.

In Computer networking, network devices such as routers and switches are usually configured (programmed) through the use of specific network commands commonly referred to as configs e.g show int description, config terminal (config t), show IP address, etc.

In Cisco devices, there are five (5) main types of command modes;

1. Sub-interface configuration mode.

2. Interface configuration mode.

3. Line configuration mode.

4. Router configuration method.

5. Global configuration mode.

Global configuration mode is a configuration mode that avail network engineers and end users with the ability to modify or edit the running (global) system configuration of a networking device. Thus, any change effected at the global configuration mode will affect the network device as a whole.

In global configuration mode, the steps which are necessary to edit an ip address on an Ethernet interface include;

I. You should enter interface configuration mode using the "configure terminal" command.

II. Configure the IP address and subnet mask.

See an example below;

"Router(config-if)# IP address 192.168.1.2 255.255.255.0"

4 0
3 years ago
The term "net radiation" refers to _____ the total amount of energy received by earth. the total amount of energy radiated by ea
Nimfa-mama [501]

The term "net radiation" refers to <span>the difference in amount of incoming and outgoing radiation the total amount of energy received by earth.
</span>
<span>Energy comes from the sunlight penetrates the top of the atmosphere- that's the incoming energy. Then some of it is lost by reflection of clouds or the Earth's surface, thermal radiation- that's the outgoing energy.</span>

5 0
3 years ago
A __________ tries to break it security and gain access to systems with no authorization, in order to prove technical prowess.
Goshia [24]
Black-hat hacker is the answer. Hope this helps.
6 0
3 years ago
Other questions:
  • This is tech question related to mobile and PC.
    6·1 answer
  • True or False? In C++, the expression (a + b / c) / 2 is implicitly parenthesized as ((a + b) / c) / 2.
    9·1 answer
  • Select all that apply.
    9·1 answer
  • Write a program which capitalize every character after full stopin a given sentence
    11·1 answer
  • Which term describes the order of arrangement of files and folders on a computer
    11·1 answer
  • Question 2Write a MIPS assembly implementation of the following C/C++ code. Assume small, unsigned integer arithmetic (no range
    10·1 answer
  • so im doing this school challenge and the teachers said whats the average text a student gets a day so i need to get about 20 in
    13·2 answers
  • Write a program in which you input three numbers they canhave decimals so float values and the program gives you the minvalue ou
    8·1 answer
  • Why do you think there is a difference between good, clean designs compared to the bad, cluttered designs below?.
    6·1 answer
  • Which tab allows you to review the slideshow timings?<br> O Home<br> O View<br> O Review<br> O File
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!