The <u>OSI model</u> describes how data actually moves from an application on one computer to an application on another networked computer.
<h3>What is the OSI model?</h3>
OSI model is an acronym for open systems interconnection and it comprises seven (7) main layers, which typically starts from the hardware layers (layers in hardware systems) to the software layers (layers in software systems)
<h3>The layers of the OSI model.</h3>
Basically, there are seven (7) layers in the open systems interconnection (OSI) model and these include the following in sequential order;
In this context, we can infer and logically deduce that the <u>OSI model</u> is typically used to describe and illustrate how data moves from a software application on one computer to a software application located on another networked computer.
Read more on OSI model here: brainly.com/question/26177113
#SPJ1
Answer:
A computer does not have brain of its own
Answer:
Topology means arrangement of nodes
Explanation:
In computer science the word topology means the arrangement of nodes and elements in a network. For any topology we do need nodes and cables for maintaining the infrastructure.
In mesh topology the all nodes use to get connected by direct link. While each and every node is directly associated with one another. In this infrastructure we do need lot cabling where every node will be connected with one another. While usage of good quality cable in network is also expensive to manage. Although there are lot of benefits of this topology, where the transmission of data would never stop if node is not working the rest will be working to transfer the data among other nodes ,this is more secure because there is no traffic for data to travel via many nodes to reach the destination. Every node is directly connected and communicate. So, once the node is not working the communication will not be stop but the maintenance and troubleshooting will be difficult in this infrastructure.
It is proved along with lot of benefits and network security ,this infrastructure is having some disadvantages as well. Cabling expense , maintenance cost etc . usually small scale networks do not prefer mesh topology. Small scale and low budget companies can not afford this topology because it is expensive.
Although we do believe that the data security is most important for today's era ,so few companies those wanted to keep their information secure and confidential they must use mesh topology by ignoring the cost incurred for this set up. Data security and integrity would never be compromised by some of the companies.
Mesh topology is more safer, more quick infrastructure which is although very expensive , difficult to mange and maintain. Moreover it is overhead of cabling as well to connect every node but the demand of mesh topology would never be less. It is demanding and appealing topology still.
Answer:
gpresult
Explanation:
Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.
Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.
There are various group policy commands such as;
- rstrui (System Restore tool will run),
- runas (using different permission to run a tool or program),
- tasklist (currently running programs are shown
- gpupdate (Group policies are refreshed)
- gpresult (group policy configurations are displayed for verification)
gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date
Answer:
Explanation:
A ruler
;););););););););););););););)