1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
4 years ago
7

Can Anybody Answer This For Me ?

Computers and Technology
1 answer:
AlladinOne [14]4 years ago
3 0

Answer:

I'm pretty sure its 3 only (c) III only gimme brainliest

You might be interested in
Describe how layers in the ISO reference model correspond tolayers in the TCP/IP reference model.
Alexxx [7]

Answer and explanation : The TCP/IP means TRANSMISSION CONTROL PROTOCOL AND INTERNET PROTOCOL It governs all the communication which are performed over network it has a set of protocol. It defines how different types of conversation are performed without any fault through a network

THERE ARE 5 TYPES OF LAYER IN TCP/IP MODEL

  • APPLICATION LAYER: It is present at upper level it is used for high level products for the network communication
  • TRANSPORT LAYER: This layer is used for transfering the message from one end to other end
  • NETWORK LAYER : Routers are present in network layer which are are responsible for data transmission
  • DATALINK LAYER : it is used when there is any problem in physical layer for correcting this datalink are used
  • PHYSICAL LAYER: Physical; layer are responsible for codding purpose which we used in communication process

5 0
4 years ago
Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
Paladinen [302]

Using an electronic signature on official documentation best illustrates the process of authentication

Further explanation:

The continuous rise of Electronic signatures has made it easier for people to accept signed documents by email or through electronic devices. One good example of electronic signatures is the implementation of digital signatures which broadly encompasses many types of electronic signatures out there. Digital signatures are unique to each signer and follow a standard authentication protocol called PKI. PKI use mathematical algorithms to generate what are known as private and public keys.

A good example is Bob and Jane. Jane sends an eSignature document using her private keys. Bob receives this document with an attached copy of Jane’s public key. The signature will be considered valid if the public key decrypts the signature correctly.

Learn more about eSignatures and electronic signatures.

brainly.com/question/8776017

#LearnWithBrainly

7 0
4 years ago
It's safe to download files from the internet if u perform regular Windows security updates, that is all u need to protect your
Vlad1618 [11]

Answer

TRUE

Explanation

A computer virus is a self-replicating program which are malicious and are designed to infect and gain control over a computer without the owner's knowledge.

To protect your computer from viruses especially when downloading files from the internet, it is advisable for one to perform regular windows security updates. This is because because windows have malware definitions to its windows defender and security essential utilities.

7 0
4 years ago
Read 2 more answers
Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadshe
omeli [17]

Answer:

Link the chart.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

In this scenario, Hoda needs to create a chart that is associated with an Excel spreadsheet. Also, she wants the data in the spreadsheet to change as soon as the chart in her presentation is updated. Thus, the option she must choose is to link the chart with the spreadsheet.

In the source spreadsheet, she should select a chart and the cell where she wants the hyperlink to appear. Then, she should create a hyperlink that links to the spreadsheet.

8 0
3 years ago
When a program has several modules calling other modules, programmers often use a program ____, which operates similarly to an o
maw [93]

Answer:

hierarchy chart

Explanation:

Based on the information provided within the question it can be said that in this scenario programmers usually use a hierarchy chart. This is a chart that shows the relationship that exists between various different modules that are able to call on another. Therefore showing the programmers the organization of the entire overall program.

3 0
3 years ago
Other questions:
  • Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi
    13·2 answers
  • Environmental technology examples
    15·1 answer
  • The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately. editreg.
    12·1 answer
  • What is the autocad term for standard section line symbols?
    13·1 answer
  • How many responses does a computer expect to receive when it broadcasts an ARP request?why?
    12·1 answer
  • Complete the program by writing and calling a function that converts a temperature from Celsius into Fahrenheit. Use the formula
    13·1 answer
  • Write a c++ program to calculate the approximate value of pi using this series. The program takes an input n that determines the
    13·1 answer
  • Name all mario kart games in order
    15·2 answers
  • Please help i will give you brainiest and 5 stars answer the question!!!!!!!!!!!!!!!!!!!!!!!!!
    7·1 answer
  • Which tool allows users to share code and also serves as a social networking
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!