Answer and explanation : The TCP/IP means TRANSMISSION CONTROL PROTOCOL AND INTERNET PROTOCOL It governs all the communication which are performed over network it has a set of protocol. It defines how different types of conversation are performed without any fault through a network
THERE ARE 5 TYPES OF LAYER IN TCP/IP MODEL
- APPLICATION LAYER: It is present at upper level it is used for high level products for the network communication
- TRANSPORT LAYER: This layer is used for transfering the message from one end to other end
- NETWORK LAYER : Routers are present in network layer which are are responsible for data transmission
- DATALINK LAYER : it is used when there is any problem in physical layer for correcting this datalink are used
- PHYSICAL LAYER: Physical; layer are responsible for codding purpose which we used in communication process
Using an electronic signature on official documentation best illustrates the process of authentication
Further explanation:
The continuous rise of Electronic signatures has made it easier for people to accept signed documents by email or through electronic devices. One good example of electronic signatures is the implementation of digital signatures which broadly encompasses many types of electronic signatures out there. Digital signatures are unique to each signer and follow a standard authentication protocol called PKI. PKI use mathematical algorithms to generate what are known as private and public keys.
A good example is Bob and Jane. Jane sends an eSignature document using her private keys. Bob receives this document with an attached copy of Jane’s public key. The signature will be considered valid if the public key decrypts the signature correctly.
Learn more about eSignatures and electronic signatures.
brainly.com/question/8776017
#LearnWithBrainly
Answer
TRUE
Explanation
A computer virus is a self-replicating program which are malicious and are designed to infect and gain control over a computer without the owner's knowledge.
To protect your computer from viruses especially when downloading files from the internet, it is advisable for one to perform regular windows security updates. This is because because windows have malware definitions to its windows defender and security essential utilities.
Answer:
Link the chart.
Explanation:
Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents.
A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.
In this scenario, Hoda needs to create a chart that is associated with an Excel spreadsheet. Also, she wants the data in the spreadsheet to change as soon as the chart in her presentation is updated. Thus, the option she must choose is to link the chart with the spreadsheet.
In the source spreadsheet, she should select a chart and the cell where she wants the hyperlink to appear. Then, she should create a hyperlink that links to the spreadsheet.
Answer:
hierarchy chart
Explanation:
Based on the information provided within the question it can be said that in this scenario programmers usually use a hierarchy chart. This is a chart that shows the relationship that exists between various different modules that are able to call on another. Therefore showing the programmers the organization of the entire overall program.