1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
13

While troubleshooting a connectivity issue in your network, you did a Ping from Host A to Host B, and the Ping was successful. F

rom this, where can you conclude the issue resides?
Computers and Technology
1 answer:
xeze [42]3 years ago
5 0

Answer:

Above OSI Layer 3

Explanation:

You might be interested in
A(n) ____________ is special high-speed memory that allows a microprocessor to access data more rapidly than from memory located
iren [92.7K]

Answer is CPU cache

Explanation: A CPU cache is a special high-speed memory which is smaller and faster, and which helps to store copies of data from main memory location which are often used. It is actually located quite close to the processing core, and is used by the CPU of a computer to save time and energy in accessing data from the main memory.

The way it works is if the processor is either trying to read from or write to a particular location in the main memory, it checks to see if the data from the location is already in a cache, if it is, then it alternatively read from or write to the cache; which faster, instead of the main memory.

Please let me know if this helps.

7 0
3 years ago
Read 2 more answers
Which of the following is true about named ranges?
ohaa [14]

Answer:

Regarding a named range, the scope of a name is the location within which Excel recognizes the name without qualification. ... Once you name a range, you can change the size of the range using the Name Manager. True. You can create a new range by selecting the cells and typing a name in the Name box next to the formula bar ...

This is true about a range names. Hoped this helped a little. Im not sure which following you mean. maybe next time you can put a picture or descirbe it a little more or what the otions are.

I Hope You Have a Good Day or Night!! :)

Explanation:

5 0
3 years ago
Using the employment websites, search for part-time jobs that relate to the career fields you are interested in pursuing or to y
arsen [322]

In order to start a part time job first we have to do some research in particular criteria they are Research your degree and occupational information and industry information.

Explanation:

There are many part- time jobs, they are web developer, sales representative, interpreter and translator and content writer.

There are various websites for this kind of jobs. For example in Quicker, Monster and indeed .com are some of the websites.

The we developer job is creating website for the customer based on the requirements. Example school management, library management.

Then comes data entry job it is a simple job that is to enter the captcha and correcting errors in files and copy pasting job.

Content writer is a job in which the different types of questions are answered for the U.S based companies.

7 0
3 years ago
Read 2 more answers
Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per se
Len [333]

Answer:

Following are the solution to this question:

Explanation:

In point 1:

Trials frequency = \frac{100 \  million }{second}

calculating the main length of cryptography = 112 bit

\to 100\  Million = 1 \times 10^8

calculating the second year value:

\to 365 \times 24 \times 60 \times 60 =3153600\\\\

                                  =3.15 \times 10^7 \ seconds

Currently, in average , at least half the possible sleeves is being used to verify the encryption process:  2^{111} \ keys

\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years

the total time value will be 8.22 \times 10^{20} \ years

In point 2:

In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).  

Algorithm:-

The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::  

ciphertext = EK3(DK2(EK1(plaintext)))

I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.  

The reverse is the decryption:  

plaintext = DK1(EK2(DK3(ciphertext)))

I.e. decrypt by K3, crypt by K2, decrypt by K1.  

Every three-bit authentication encrypts a 64-bit block.

Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.

4 0
3 years ago
Help thanks appreciate it
Mnenie [13.5K]
Select all answers for #4
7 0
3 years ago
Other questions:
  • In a virtual memory system, each process must have its own page table.(True or False?)
    13·1 answer
  • Complete each sentence to describe different elements of an Excel worksheet.
    11·2 answers
  • Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is d
    14·1 answer
  • 7) through: (0, 4) and (-1,0)​
    10·1 answer
  • URGENT HELP PLEASE
    15·1 answer
  • Why transport layer is usingconnectionless services if network layer is providing connection oriented services?
    10·1 answer
  • Guyssss......urgent helppp plsss answerrrr
    5·1 answer
  • What is one way that Accenture helps clients ensure fairness when applying AI solutions?
    13·1 answer
  • 2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary
    5·1 answer
  • Treating others with respect, even when they're impolite, is considered
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!