1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
8

Sarah is working with a team of subject matter experts to diagnose a problem with her system. The experts determine that the pro

blem likely resides at the Presentation Layer of the Open Systems Interconnection (OSI) model. Which technology is the most likely suspect?a. User interfaceb. Encryptionc. Routingd. Signaling
Computers and Technology
1 answer:
sladkih [1.3K]3 years ago
4 0

Answer:

The answer is "Encryption"

Explanation:

Encryption seems to have been established in the new network protocol stack Layer-3 (IPSec) and Layer-4 (SSL, TSL), which enable connectivity across platforms. Currently, network companies allow the sachet-level technologies, that encrypted information and wrong choices can be described as follows:

  • In option a, It uses the application layer to interact with the user to display data and images, that's why it is incorrect.
  • In option c, It is wrong because it is used to store and forward the data.
  • In option d, It is wrong because it is used to start and stop the transmission.
You might be interested in
I’m joining the robotics team in my school, but my knowledge is pretty basic. What should I do to improve myself?
Aleonysh [2.5K]
Start learning the functions of a computer and really put ur heart into it
8 0
3 years ago
Sarah has prepared a project document about the small and medium-sized companies in the United States. While proofreading, she r
erik [133]
The answer is F7. When you click F7 it highlights key words.<span />
3 0
3 years ago
Read 2 more answers
What did research conducted in 2009 at Carnegie University Mellon predict?
riadik2000 [5.3K]

A.Information on social networking sites can give most or all digits of a person’s social security number.


5 0
3 years ago
The new tag in HTML 5 means that it explanation or pronunciation of characters for Asian typography O sets a container for an ex
Eddi Din [679]

Answer:

yes very correctExplanation:

5 0
3 years ago
. Which of the following refers to the informal rules for how to behave online? A.
natta225 [31]

Answer:

D.netiquette

hope it is helpful to you

5 0
3 years ago
Other questions:
  • Dominick has been hired to design a network for Pirate Press. In a paragraph of no less than 125 words, discuss what he needs to
    12·2 answers
  • Read three integers from user input. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30. Note: Our s
    6·1 answer
  • What is the difference between HTML and CSS? * 1. CSS is a markup language unlike HTML. 2. HTML is a backend technology and CSS
    12·2 answers
  • Which of the following is the best definition of being a “digital citizen”?
    6·2 answers
  • What are interpersonal skills?
    12·2 answers
  • Your network has four Hyper-V hosts, which are running three domain controllers and about 10 member servers. Three of the member
    10·1 answer
  • Where ....................... the books that you borrowed? *
    5·1 answer
  • Which of the following examples can be solved with unsupervised learning?
    8·1 answer
  • The cafeteria offers a discount card for sale that entitles you, during a certain period, to a free meal whenever you have bough
    13·1 answer
  • Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!