1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
3 years ago
8

What are the FIVE layers in the Internet protocol stack? What are the principal responsibilities of each of these layers?

Computers and Technology
1 answer:
kifflom [539]3 years ago
4 0

Answer: The internet protocol (IP) stack consist of the five layers and their functioning which are as follows:-

  • Application layer:- this layer is responsible for the type of service that is operating the system.It uses protocols like SMTP(Simple mail transfer protocol, FTP(file transfer protocol) etc.
  • Network layer:-this layer is used for the routing and transmission of the data packets through the routes. The exchange of IP packets is done between the server and the client.  
  • Transport layer:-It uses the  protocols TCP(Transmission control protocol) and UDP(User datagram protocol)for splitting the message and sending it to the recipient's address.
  • Data link layer:-it uses the point-to-point protocol for the sending the message from node to node.It also handles the data while inputting and outputting of the physical network.
  • Physical layer:-The working is done in a frame in which the the bits present in one node is transferred to other. It is used for defining the physical parameters like cables, etc.

You might be interested in
Task 1 – File Input
e-lub [12.9K]

Answer:

Check the explanation

Explanation:

using System;

using System.IO;

                 

public class Program

{

 

  public static void Main()

  {

      string[] lines;

      Console.WriteLine("enter name of the file");

      String fileName=Console.ReadLine();

     

      Console.WriteLine("enter path of the file");

      String filePath=Console.ReadLine();

     

      using (StreamReader streamReader = File.OpenText(filePath))

      {

          String text = streamReader.ReadToEnd();

          lines = File.ReadAllLines(filePath);

      }

      Console.WriteLine("Enter path of the file to write");

      String outputFilePath = Console.ReadLine();

      bool fileExist = File.Exists(outputFilePath);

      if (fileExist)

      {      

                  overWriteOrChangeFileName(outputFilePath);          

      }

      else

      {

          File.Create(outputFilePath);

          File.WriteAllLines(outputFilePath, lines);

      }

      Console.Write("Input file Path"+filePath);

      Console.Write("output file path"+outputFilePath);

     

      void overWriteOrChangeFileName(String filePathtoCheck){

          Console.WriteLine("File exists. Do you want to overwrite the file or do you want to change the location and file name of the new file.Press Y to overwrite and press C to change the location and filename");

          String userInput=Console.ReadLine();

          if(userInput.Equals("Y")){

File.WriteAllLines(outputFilePath, lines);

          }else{

              Console.WriteLine("enter new path of the file including filename");

              String NewFileName=Console.ReadLine();

              outputFilePath=NewFileName;

              if(File.Exists(outputFilePath)){

                  overWriteOrChangeFileName(outputFilePath);                  

              }

              else

      {

          File.Create(outputFilePath);

          File.WriteAllLines(outputFilePath, lines);

      }

          }

      }

  }

 

}

3 0
3 years ago
Universal Containers has a requirement to integrate Salesforce with an external system to control record access.
Alenkasestr [34]

Answer:

C.  Use the SOAP API to maintain the related SObject_share records

Explanation:

In order to ensure that Universal Containers have complete control over the system, the company needs to use certain requirements. This is to ensure that non-authorized persons do not have any access to the information. Based on the information provided in the question, the correct option is option C.

3 0
3 years ago
At the time of signing, what was the title of the man who is the first of the two names in the name of the 1901 treaty that null
pshichka [43]
The answer is the US Secretary of State.  <span>At the time of signing,Secretary of State was the title of the man (John Hay) who is the first of the two names in the name of the 1901 treaty that nullified the Clayton-Bulwer Treaty. </span>It was signed by US Secretary of State John Hay and British Ambassador to the United States Lord Pauncefote on the 18th of November 1901. 
3 0
3 years ago
Read 2 more answers
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support
grandymaker [24]

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

4 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
OleMash [197]

Answer:The page up and page down keys are sometimes called PgUp or PgDn and they are located on the right of the keyboard with page up on top and page down on the bottom. This short article about technology can be made longer.

Explanation:

3 0
3 years ago
Other questions:
  • How to turn off new macbook pro when it is frozen 2017
    11·2 answers
  • c++ Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is c
    14·2 answers
  • 1. Write a class for time objects that store three integer values for hour, minute, and second. Also, write a program to test th
    13·1 answer
  • Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since th
    15·1 answer
  • What is the family access code right now?
    5·1 answer
  • 1
    5·2 answers
  • The Internet was first used by which of the following institutions?
    7·1 answer
  • Pls awnser if awnser is wrong I will unmark brainliest
    5·1 answer
  • How can I use HTML to express a personal value
    13·1 answer
  • Which type of network allows backups and network security to be centrally located?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!