1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
9

What is a characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications amon

g many hosts?
Computers and Technology
1 answer:
Paladinen [302]3 years ago
6 0

Answer:

The correct answer to the following question will be "The capacity to work without reference to the data that would be contained in each bundle".

Explanation:

  • The Layer network governs the activity of the subnet. The main objective of this layer would be to transport data over multiple links from source to destination. When two computers are linked to the same cable, see no need for the network layer.
  • The role of this layer protocols defines the configuration and handling of packets used to transfer information from one to another host.
  • The main purpose of this layer is to allow multiple channels to be intertwined. This is achieved by sending packets to network adapters that depend on algorithms to identify the best directions for the information to move. Such routes are referred to as computer circuits.

Therefore, it would be the right answer.

You might be interested in
WILL GIVE BRAINLIEST!! 20 PNTS!!!
Anettt [7]

Answer:

C 1,2,3,4

Explanation:

This means I want to count from 0-4 and set it o the current loop I am currently on.

for i in range(0, 5):

 print("i currently equals: ", i)

The result will be

i currently equals: 0

i currently equals: 1

i currently equals: 2

i currently equals: 3

i currently equals: 4

8 0
2 years ago
Read 2 more answers
g P4. (5pts) IPv4 tunneling was introduced to solve this issue of forwarding IPv6 packets via IPv4 routers. Please explain how t
sergejj [24]

Answer:

In IPv4 tunneling, IPv6 packets are encapsulated in the IPv4 packets, adding a header comparing the source IP, the packet entry point to the tunnel and the destination point, as well as the exit point of the tunnel.

Explanation:

IPv6 is the latest version of the network address. They eliminate the exhaustion of addresses experienced in IPv4, but is it not used in all networks which makes it hard to communicate with other networks with IPv4 and with IPv6 addresses through IPv4 medium.

To avoid the needed to reconfigure other IPv4 networks to IPv6 and establish communication between the networks, IPv4 tunneling is used to transmit IPv6 packets from one IPv6 network to other IPv6 networks through the IPv4 transmission cables or mediums.

7 0
2 years ago
What in Photoshop is used for "choosing a preset or user-defined brush tip for a painting or editing tool"?
tankabanditka [31]

Answer:

Tool Preset Menu in the option bar

Explanation:

This allows you to customize and define characterisitics on a preset brush, such as size, shape, and hardness.

hope this helps :)

8 0
3 years ago
What is part of file name that usually reflects the file format?
tatiyna

Answer:

It is called the Extension. Hope this helps :))

Explanation:

8 0
3 years ago
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
xenn [34]

Answer:

<em>D. Brute force attack</em>

Explanation:

A Brute Force Attack <em>is the </em><em>fastest way</em><em> of accessing a website or database (or whatsoever secured by a password).</em> It attempts repeatedly different combinations of usernames and passwords till it breaks in.

This repeated behavior is just like an enemy that attacks a fort.

Optionally, using a key derivation function, the attacker can try to guess the key generally created from the password. This is known as an exhaustive key search.

4 0
2 years ago
Other questions:
  • Which key removes all data from an active cell with one click
    7·2 answers
  • The feature that sets Macs apart from other operating systems is the _____.
    6·2 answers
  • 1.
    5·2 answers
  • This type of peripheral is used to interact with, or send data to, the computer.
    12·2 answers
  • 1. How does inertia affect a person who is not wearing a seatbelt during a collision?
    9·2 answers
  • Which of the following economic systems leaves production decisions completely up to the producers?
    15·2 answers
  • You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its
    11·1 answer
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • “The software crisis is aggravated by the progress in hardware technology?” Explain with examples
    8·1 answer
  • Discuss new concepts that you have learned about Cisco Devices and how they will be helpful in the workplace.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!