1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
5

"Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer

?"
Computers and Technology
1 answer:
ExtremeBDS [4]3 years ago
8 0

Answer:

The Session layer (Layer 5)

Explanation:

The OSI (Open Systems Interconnection) seven-layer model is a reference model that explains how devices (or applications) communicate over the network. The model consists basically of seven different layers which are;

i. Layer 1 or the physical layer

ii. Layer 2 or the data-link layer

iii. Layer 3 or the network layer

iv. Layer 4 or the transport layer

v. Layer 5 or the Session layer

vi. Layer 6 or the presentation layer

vii. Layer 7 or the application layer.

Out of the seven layers, the session layer (layer 5) keeps track of a system's connections to send the right response to the right computer by setting up, coordinating and managing these connections. It controls, establishes and maintains the connection between multiple computers or applications on a computer.

You might be interested in
ASAP Please Answer Question Within 5 Minutes! OSI is a reference system used by most types of technicians EXCEPT. Answer: Engine
likoan [24]

Answer:

Technical Illustrator do not use ISO reference model in their work. They often use graphical and visual drawing tools of technical illustration in their work. However, Network engineer and computer scientist  often used ISO reference model in their work. As you know that, ISO is a standard for protocol used for communication between two computers.

Explanation:

Technical Illustrator

A technical illustrator makes illustration and visual representation of a product in order to communicate technical information of technical nature with customer/user. The technical illustrator illustrates the technical presentation of the product in manuals and in publication. However, the technical illustrator doesn’t use the ISO model in their work. They use graphical and visual tools to help their work effectively.

Engineer:

Network engineers, communication and internet engineers use the ISO model. For example, if any fault occurs in LAN, to diagnose the fault, the network engineer uses the ISO model to identify the error in ISO layers. They use the ISO conceptual model, in order to know which layer is producing the fault.

Computer Scientists:

The computer scientist who is working in the field of telecommunication, they often use the ISO model as a base, to make improvement in the communication system and management of telecommunication system.

7 0
3 years ago
Read 2 more answers
When should graphic elements be included in business documents?
Alekssandra [29.7K]
<span>Logos on letterhead, advertising, business cards. Hope this helps.</span>
5 0
3 years ago
5. You were discussing software piracy with a friend and were surprised to learn how software piracy can impact your life every
hammer [34]
In class we learned not to keep but so much information on software. Your information can be hacked at any given moment. Hackers can use your information to their personal used. Do not open or respond to spam emails or pop ups saying you won anything its a scam and they can send a virus to your computer only thing they need is for you to open the email. If you have a virus backup your data then reset your whole computer the virus would be gone. Software privacy can effect your life very much just watch what you put on your computer.
5 0
3 years ago
Using the Web or another research tool, search for alternative means of defending against either general DoS attacks or a partic
Thepotemich [5.8K]

Answer and Explanation:

DOS attacks refer to Denial of Service attack. It is a sort of digital attack where a programmer hacks the system of a framework and makes it inaccessible for the clients which results in intruding on the internet providers of the machine.  

At the end of the day, access to online administrations is denied for the client. Any sort of system administration can be upset by DOS assaults be it either bank site or an online business site.

Following is one of the defense techniques against DOS attacks:

Using Routers and Firewalls - As switches have rate constraining and access control capacities, so they can be set up in a legitimate manner to stop basic ping assaults by permeating unessential conventions and can likewise stop invalid IP addresses. In any case, the main hindrance for utilizing switches is that they are usually ineffective against an increasingly advanced parodied assault and application-level assaults utilizing substantial IP addresses. Presently here comes the job of firewalls. Firewalls can ensure the system by dismissing all the traffic landing from aggressor's end. This insurance by firewalls depends on basic principles dependent on conventions, ports or the starting IP addresses.  

Be that as it may, it is difficult to hinder some mind boggling assaults by these straightforward standards. For instance, if there is a progressing assault on port 80 (web administration), it is beyond the realm of imagination to expect to drop all approaching traffic on this port in light of the fact that doing so will keep the server from serving genuine traffic.  

One detriment of firewall is that Firewalls can close down a particular stream related with an assault, however like switches, they can't perform hostile to ridiculing.

7 0
3 years ago
Mt. Everest, the highest mountain in the world, is located in Asia.<br><br> True<br> False
Roman55 [17]
True, it is located on the border of Nepal and Tibet.
8 0
3 years ago
Other questions:
  • A custom information field that helps users to find a specific document is called
    8·2 answers
  • The answer is family and friends
    8·2 answers
  • virtue by which you need to secure information by limiting computer access to authorized personnel only
    11·1 answer
  • _____ is a predefined format used for text the can include multiple font formatting features
    13·1 answer
  • Most Muslims are Sunni Muslims; however, the Shiites are a forceful minority in some parts of the Middle East. The Sunni-Shiite
    13·1 answer
  • Quick!!!!!
    13·2 answers
  • How is science and technology used in the society​
    11·1 answer
  • Suppose you are working as an administrative assistant at a small law firm. Your boss has asked you to send an invitation out to
    5·1 answer
  • Helppp me eeeeee eee
    5·2 answers
  • If you use your smartphone as a hotspot to connect to the Internet on your tablet you are using a ________.quillet
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!