1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
3 years ago
5

A message M is encapsulated by the TCP, IP and Ethernet protocols in that order as it travels down a protocol stack. What does t

he frame look like when observed on the Ethernet link? T for TCP header, similarly for I and E, and M for the message.
A. TIEM
B. ITM
C. EITM
D. MTIE
Computers and Technology
1 answer:
vekshin13 years ago
8 0

Answer:

The answer is "option C"

Explanation:

The EITM system was established in July 2001 with a call for proposals for the NSF training institute. The USA also offers courses in this European country. This program provides mechanical quantum and philosophy lectures, as well as another philosophical and applied course that varies year after year, that's why this option is correct and others are wrong, which can be defined as below:

  • Option A, and Option D both are incorrect because it's not a part of the TCP.
  • In option B, It is used in transaction, that's why it is incorrect.
You might be interested in
The array mycats is an 8 element array of type kitty that has already been declared and initialized. write the expression(s) in
Basile [38]
Console.log(mycats[3])
5 0
3 years ago
When it comes to saving money, what is a good rule of thumb?
Leviafan [203]
-Not to make impulse buys
-Open a savings account that directly adds a set amount of money into it from your paycheck monthly 
-The '50-30-20' rule(<span>50 percent of your income toward necessities, like housing and bills. Twenty percent should then go toward financial goals, like paying off debt or </span>saving<span> for retirement. Finally, thirty percent of your income can be allocated to wants, like dining or entertainment.)</span>
-Create a budget 
6 0
3 years ago
Read 2 more answers
All of the following are examples of hardware, except:
WARRIOR [948]

Answer:

Microsoft Word.

Explanation:

Microsoft Word is an example of Software, while monitors, keyboards, and a mouse are hardware.

7 0
3 years ago
Read 2 more answers
What did Francis Ford Coppola and George Lucas create?
garik1379 [7]
. 3d animation markers
7 0
3 years ago
Consider the following general code for allowing access to a resource:
Margaret [11]

Answer:

a) The code allows access even when  IsAccessAllowed(...) method fails.

b) Either use If

(dwRet = ACCESS_ALLOWED)

or use

if (dwRet == NO_ERROR)

to avoid flaw

Explanation:

Lets first see what the code chunk does:

DWORD dwRet = IsAccessAllowed(...);

if (dwRet == ERROR_ACCESS_DENIED) {

// Security check failed.

// Inform user that access is denied.

} else {

// Security check OK.

}

In the given code, DWORD is basically a data type for double word type integers and this is defined in windows.h

So there is DWORD type variable dwRet that is assigned a method calls.

The method is IsAccessAllowed() which checks if the access is allowed to user.

if (dwRet == ERROR_ACCESS_DENIED) condition basically checks if the value of DWORD type variable dwRet is equal to ERROR_ACCESS_DENIED

If this condition evaluates to true then the security checks fails and user is informed via some message or action that the access is denied.  But when the if condition evaluates to false then the else part executes which allows access.

So basically this chunk of code checks if the error ERROR_ACCESS_DENIED is returned.

Now the flaw in this program is what if the method IsAccessAllowed() by any reason. The reasons can be system failure or the memory failure. In memory failure case for example, the system returns out of memory error. So this means that the error is not  ERROR_ACCESS_DENIED. Instead it is out of memory error. So in such a case the user is allowed access as the if condition evaluates to false and else part executes. So if any other error is produced due to some reason like mentioned above, then user has unrestricted access.

This shows that the doe should not check for the failure or rely on checking ERROR_ACCESS_DENIED to allow access but instead it should check for success. Code should only give access privilege if access is allowed successfully or no error is produced.

So to avoid this flaw the code is altered as:

DWORD dwRet = IsAccessAllowed(...);

If (dwRet = ACCESS_ALLOWED) {

//Security check OK.

} else {

//Security check failed.

//Inform user that access is denied.

}

This will only allow access if ACCESS_ALLOWED evaluates to true and success is checked instead of failure here

You can also alter the if condition as:

If (dwRet = No_Error)

or

If (dwRet = 0)

The above if conditions checks if the access is allowed or if no error is produced. Only then it will allowed access otherwise not. So the access check is a success is checked first and failure (for any reason). The user is allowed access only if there is no error otherwise user is not allowed access.

6 0
3 years ago
Other questions:
  • In addition to training on the products and on company policy, it does not make sense to be prepared to speak about your company
    6·2 answers
  • Which of these is one of the primary concerns for protecting your family when online?
    9·2 answers
  • What made it possible to develop personal computers?
    10·2 answers
  • Pls help I will give lots of points
    9·1 answer
  • I want to solve this question in C program, Please.
    7·1 answer
  • Describe how data is transmitted using half-duplex serial data transmission.
    9·1 answer
  • (a) Write a program which calculates and displays the obtained marks, percentage in six subjects and assigns grades based on per
    6·1 answer
  • Write a program which will enter information relating to a speeding violation and then compute the amount of the speeding ticket
    12·1 answer
  • Name any three areas of of application of excel.
    12·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!