1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
3 years ago
8

As each layer of the OSI model adds its encapsulation header and/or footer, the ______ gets larger until it reaches the physical

layer at which time it leaves the device for delivery.
Computers and Technology
1 answer:
aleksklad [387]3 years ago
5 0

Answer:

Message

Explanation:

  • The Application layer creates a message. The Application layer passes the message to the Presentation layer.
  • The Presentation layer encapsulates the message by adding information to it. Information is usually added only at the beginning of the message (called a header); however, some layers also add material at the end of the message (called a footer)
  • The process of passing the message down and adding layer-specific information continues until the message reaches the Physical layer.
  • At the Physical layer, the message is converted into electrical impulses that represent bits and is transmitted over the physical connection.  
  • The receiving computer captures the bits from the physical connection and re-creates the message in the Physical layer.  
  • The Physical layer converts the message from bits into a Data Link frame and sends the message up to the Data Link layer.
  • The Data Link layer strips its information and sends the message up to the Network layer.
  • This process of deencapsulation is performed until the message reaches the Application layer.
  • When the message reaches the Application layer, the data in the message is sent to the intended software recipient.
You might be interested in
Can someone tell me what this means Higfaa
Arisa [49]

Answer:

it's a Jamaican slang

Explanation:

it depends on the wah it is used

7 0
3 years ago
What information on social networking sites could be used to discriminate against a potential employee
NISA [10]

the answer on plato is b

political affiliations

3 0
3 years ago
In addition to MLA, what are some other widely used style guides? Check all that apply.
STALIN [3.7K]

Answer:

In addition to MLA, <u>American psychological association, Associated Press and Chicago manual of style</u> are widely using referencing techniques,

Explanation:

<u>American Psychological Association(APA)</u>

APA is the largest organization of scholars, they have their own referencing style guidelines that is used by these scholars.

<u>Associated Press</u>

It is also an american based agency that have their own referencing style for citation of research work named as Associated press.

<u>Chicago Manual of Style</u>

It is also an american referencing style used for reference.

8 0
3 years ago
Class members are accessed via the ____(1)_____ operator in conjunction with the name of an object of the class, or via the ___(
Alborosie

Answer:

1.ClassName and . operator

2. ClassName and [] operator

Explanation:

There are two ways to get the members of a class first one is by using dot(.) operator.

Example : with assumption that person is a class object and age is the member in it we can use it as:

person.age

Second way is to use [] operator with member as a string in it which is used by the compiler as key to get its value.

Example : person["age"]

5 0
4 years ago
You want to be super private with your email. You'd like to be able to download your email to a single device, then remove it fr
DENIUS [597]

Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

<h3>What is  POP3 about ?</h3>

POP3 is known to be a tool that gives one room to be able to download email to a single device, which a person want to use if they want to add privacy to their emails.

Therefore, Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

Learn more about email from

brainly.com/question/24688558

#SPJ1

8 0
2 years ago
Other questions:
  • During the Requirements Definition stage of a systems development​ project, the employees who will be the primary users of the n
    15·1 answer
  • Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st
    10·1 answer
  • Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    14·1 answer
  • A CPU has 32 KB cache, 2-way set associative, 16-byte block size. How many bits are required to use index each set in this cache
    6·1 answer
  • Is backing up computer files done on the hard drive?
    14·2 answers
  • What is a third variable condition that could create the following correlation?
    10·2 answers
  • What does a computer need from people in order to solve problems effectively?
    9·1 answer
  • How scientist and technology beliefs society
    14·1 answer
  • PLEASE HURRY!!!!<br> Look at the image below
    8·1 answer
  • Plz help Complete the sentence.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!