1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
3 years ago
5

Which osi/iso layer is responsible for determining the best route for data to be transferred?

Computers and Technology
1 answer:
RSB [31]3 years ago
3 0
TCP/IP, (I believe) layer 3 is the only layer with a concept of networks and routing.
You might be interested in
¿cuales son la diferencias de programacion estructurada y programacion orientada a objetos?
Arturiano [62]

Answer:

La programación estructurada está diseñada para enfocarse en el proceso / estructura lógica y luego en los datos requeridos para ese proceso. La programación orientada a objetos está diseñada para centrarse en los datos. ... La programación orientada a objetos admite herencia, encapsulación, abstracción, polimorfismo

Explanation:

5 0
4 years ago
Documents stored on the world wide web are written and linked together using
FrozenT [24]
Using the hypertext transfer protocol
3 0
3 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
A call center is a _______.<br><br> JIT<br><br> CMA<br><br> CIC<br><br> SFA
sp2606 [1]

Answer: CIC

Explanation:

A call center is a customer interaction center (CIC) and it is the interface between call center agent with the customers directly. CIC are connected by the external telephone system and it uses as call center.

And the caller are basically identify by the telephone number and customer information are display in the CIC.

CIC are the modular structure for communication which include various components of CIC and framework.

4 0
4 years ago
What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually d
alexandr402 [8]

Answer:

Attenuation is the one-word answer which is the correct answer for the above question.  

Explanation:

Attenuation is a concept which told about the barrier, which is used to stop the signals in the connected network systems. Attenuation can be a form of any type of barrier like weak signals, or because of long-distance.

Following are the example which is in the form of attenuation--

  1. Noise
  2. The distance can also be a problem for weak signals.
  3. Hacker also disestablished the network signals.
  4. The physical objects.

Hence the attenuation can be formed by any of the barriers of signals, like physical obstruction, longer distance, and radio inference.

7 0
3 years ago
Other questions:
  • What factor determines a boat's required equipment??
    7·1 answer
  • He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
    8·1 answer
  • Brooke is trying to save enough money in the next fifteen months to purchase a plane ticket to Australia. Every month Brooke sav
    9·1 answer
  • Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational sta
    13·1 answer
  • For questions 1 – 3, use the following partial class definitions:
    11·1 answer
  • 9.2 code practice edhesive
    14·1 answer
  • The conversion of decimal 0.0625 into its binary equivalent. Explain.
    7·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!