1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
6

The _____ layer of the Open Systems Interconnection (OSI) model generates a receiver’s address andensures the integrity of messa

ges by making sure packets are delivered without error, in sequence, andwith no loss or duplication.
a. session
b. transport
c. presentation
d. application
Computers and Technology
1 answer:
Andrei [34K]3 years ago
7 0

Answer:

The answer is "Option b".

Explanation:

OSI stands for Open Systems Interconnection. It is a seven-layer protocol in which one is a transport layer. It offers logical communication between applications that run on various hosts within a layered protocol architecture and other network components. and other options are not correct that can be described as follows:

  • In option A, It is services that terminate the connection that's why it is not correct.
  • In option C, The presentation layer is used for the accurate, specified and standardized encoding of data to the application layer.
  • In option D, This consists of protocols aimed at communication from process to process throughout an IP network and offers a firm interface of communication and end-user services that's why it is not correct.

You might be interested in
Which functions are available in a Word table? Check all that apply.
dexar [7]
All of them are available
3 0
3 years ago
Question 2 of 10
inn [45]

Answer:

b

Explanation:

I really don't but I hope its correct

8 0
2 years ago
A(n) ________ is software and/or hardware that monitors system and network resources and activities and notifies network securit
enyata [817]

Answer:

intrusion detection system

Explanation:

intrusion detection system

IDS or the intrusion detection system is the software and/or hardware system which can be used to monitor for detecting suspicious network activities and monitoring the system and notifying teams when there are attempts to break the secure network infrastructure.

5 0
4 years ago
Explain how a third party cookie can track your web browsing across multiple web domains.
Vlada [557]
A third party cookie can stay in your hard drive or browsing files, and record all the action

Hope this helps.
3 0
3 years ago
I was writing my code when all the sudden, I get this error about my if statement, it doesn't make sense to me, I indented corre
LenKa [72]

Answer:

I dont know, maybe type it again or, ask someone about it maybe?

Explanation:

7 0
3 years ago
Other questions:
  • When a programmer creates an abstract data type, he or she can decide what values are acceptable for the data type, as well as w
    12·1 answer
  • What are some activities that work especially well in Outline view? Check all that apply.
    5·2 answers
  • 11)When, if ever, will the geometric average return exceed the arithmetic average return for a given set of returns?A) When the
    6·1 answer
  • Easy upgrade from windows xp to windows 7
    7·1 answer
  • _____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterp
    11·1 answer
  • Write down a pair of integers whose sum is​ 0
    5·1 answer
  • Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
    13·1 answer
  • Which statement about the Weather Bar in the Outlook calendar is true?
    12·1 answer
  • What combination of keys will autofill highlighted cells to the right?
    10·1 answer
  • ¿En qué situaciones puedo utilizar formato condicional?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!