1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
4 years ago
8

The process of adding a header to the data inherited from the layer above is called what option below

Computers and Technology
1 answer:
Tom [10]4 years ago
4 0

Answer:

The correct answer to the following question will be "Encapsulation".

Explanation:

The wrapping of the data into a single unit or the method by which a header is applied to the data inherited from the above layer is termed as Encapsulation.

While relating to networking, encapsulation would be the method of storing and converting data through one protocol into another, so that the data can proceed over a network. A TCP/IP package contained under an ATM system, for example, is indeed a kind of encapsulation.

Therefore, Encapsulation is the right answer.

You might be interested in
Edhesive 6.3 question 1
hjlf
Is there supposed to be a picture?..
3 0
3 years ago
Write a python function that on input takes a list l of integers and returns the count of how many of the integers in the list a
stepan [7]
Def countEvenIntegers(integerList):     counter = 0     for item in integerList:          if (item%2 = 0):               counter += 1     return counter
5 0
3 years ago
Where can the greatest depths be found in the ocean?
34kurt

The answer is C: In ocean trenches.

Since the deepest part of the ocean lies in the Mariana Trench.

I hope this answered your question! :D

7 0
3 years ago
________ includes reviewing transactoin logs and uses real-time monitoring to find evidence
denpristay [2]

Complete Question:

________ includes reviewing transaction logs and uses real-time monitoring to find evidence.

Group of answer choices

A. Log analysis

B. Network analysis

C. Code analysis

D. Media analysis

Answer:

B. Network analysis

Explanation:

Network analysis includes reviewing transaction logs and uses real-time monitoring to find evidence. Network analysis is a form of computer forensic service, which involves the scientific process of identifying, capturing and analyzing or examining data that are stored on digital devices in an electronic format, for the sole purpose of unraveling the truth about an allegation such as fraud, without preempting the outcome of the investigation.

Network analysis involves the use of network analyzers such as a sniffing and tracing tool to analyze or examine network traffic in real-time. Some examples of network analyzing tools are netdetector, tcpdump, pyflag, networkminer, xplico, tsat, wireshark, omnipeek, etc.

<em>Please note, network analysis is also known as network forensics in computer science.</em>

4 0
3 years ago
Keeping memos on your checks is important because they
Anastasy [175]

Answer: they can determine how you get paid, so if you get a memo about schedules, and you work hourly, you keep keep that memo to show that you are following direction in hours, which result in getting paid more/less.

8 0
3 years ago
Other questions:
  • A keyboard and touch screen are the most common of ________ devices. select one:
    11·1 answer
  • What are two example of ways an electronic record may be distributed to others?
    11·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    10·1 answer
  • NMCI is the name used for a large-scale effort to link Navy and Marine Corps computer systems on bases, boats, and in offices ar
    15·1 answer
  • What is the difference between cybercrime and cyber security?
    12·1 answer
  • What are the classifications of computer
    9·1 answer
  • D. What is the work of the following features:<br>1. Foot note​
    10·1 answer
  • Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
    6·2 answers
  • A _________ attack is an attack on a computer system or network that causes a loss of service to users.
    15·1 answer
  • Networks that are designed to connect similar computers that share data and software with each other are called:_______
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!