1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
8

Sarah is working with a team of subject matter experts to diagnose a problem with her system. The experts determine that the pro

blem likely resides at the Presentation Layer of the Open Systems Interconnection (OSI) model. Which technology is the most likely suspect?a. User interfaceb. Encryptionc. Routingd. Signaling
Computers and Technology
1 answer:
sladkih [1.3K]3 years ago
4 0

Answer:

The answer is "Encryption"

Explanation:

Encryption seems to have been established in the new network protocol stack Layer-3 (IPSec) and Layer-4 (SSL, TSL), which enable connectivity across platforms. Currently, network companies allow the sachet-level technologies, that encrypted information and wrong choices can be described as follows:

  • In option a, It uses the application layer to interact with the user to display data and images, that's why it is incorrect.
  • In option c, It is wrong because it is used to store and forward the data.
  • In option d, It is wrong because it is used to start and stop the transmission.
You might be interested in
Which of these might be an example of an advertiser's target group?
d1i1m1o1n [39]

Answer:

I would assume C. because it's the answer that makes the most sense.

Explanation:

D. would be the other choice however, just because they live in the same region doesn't mean they watch TV or have any access to media.

5 0
4 years ago
Read 2 more answers
What is the internet?
aliya0001 [1]
What you're currently on. or a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
7 0
4 years ago
Read 2 more answers
This rights protected document cannot be opened because the rights management feature has been disabled on your machine by Polic
erastovalidia [21]

This rights protected document cannot be opened because the rights management feature has been disabled on your machine by Policy is known to be an error message.

<h3>What is the error message about?</h3>

The Error message above is known to be one that shows that  your IT department has made a group policy in one's company's Active Directory. It is known to be one that tends to disables the use of ADRMS (Rights Management Feature) in all to all users.

Note that in the case above, one need to ask your IT department to be able to disable or make changes to the group policy so that it will not apply to the users who are said to require access secured Microsoft Office documents in any of Ansarada Rooms.

Another option is to look at documents off the network with the use of a personal computer or a mobile phone.

Hence, This rights protected document cannot be opened because the rights management feature has been disabled on your machine by Policy is known to be an error message.

Learn more about  error message from

brainly.com/question/25671653

#SPJ1

4 0
2 years ago
Which of the following cools the air in a household refrigerator?
Ivanshal [37]

The following cools the air in a household refrigerator: Absorption of the heat from the air due to evaporation of the liquid refrigerant . Correct answer:B

The function of the refrigerator is to absorb heat into the refrigeration system. The evaporator is placed in the area to be cooled. The refrigerant vaporizes from the heat it absorbs heat in the evaporator.

4 0
3 years ago
Read 2 more answers
Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is mor
solong [7]

Answer:

please find the attachment of the flowchart.

Explanation:

In this question, a start block is used to start the program, in the parallelogram box we input the value from the user end and in the diamond box, we check the input is not equal to 0. In the next diamond box, it checks the given input value and print value, and at the last, we stop the code.

Please find the program and its output in the attached file.

8 0
3 years ago
Other questions:
  • When troubleshooting firewalls, which of the following is not something you should do after you attempt a fix?
    7·1 answer
  • Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says
    11·1 answer
  • What are 3 ways to select an entire document?
    15·1 answer
  • What help in executing commands quickly
    5·1 answer
  • What does the word strained mean as it is used in paragraph 16 the story is from where the red fern grows but this are the answe
    10·1 answer
  • Will mark Brainliest!! What is the best hard disk compacity? Why?
    7·1 answer
  • A term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
    11·1 answer
  • What is the best scenerio for
    11·2 answers
  • The computer components that enables a computer to send and receive data, instructions or information from one or more computers
    13·1 answer
  • When creating any digital work, what is the MOST important thing to remember?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!