1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
10

At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this

process called?
Computers and Technology
1 answer:
Makovka662 [10]3 years ago
5 0

Answer:

Encapsulation

Explanation:

There are seven layers in the OSI network model. These layers are, application, presentation, session, transport, network, data-link and physical layer.

Each layer of the OSI model has a PDU or protocol data unit. These PDUs are form by encapsulation.

The application, presentation and session data. When it moves to the transport layer, it is encapsulated within the transport header. This new pdu is called segment.

This process continues in network and data-link to give packet and frame PDUs respectively.

You might be interested in
What does this icon mean? <br> Plz hurry it’s for a school quiz you will get a brainly
Vera_Pavlovna [14]

Answer:

Filter data

Explanation:

If u dont believe me here is a pic

8 0
3 years ago
Which of the following does every font that you choose communicate, either on a conscious or subconscious level?
sergeinik [125]
I believe it is b so I will just leave it at that

3 0
4 years ago
Read 2 more answers
In its entirety, the CCM process reduces the risk that ANY modifications made to a system result in a compromise to system or da
Tom [10]

Answer: True

Explanation: CCM process is the process which basically watches over any change or modification that is being made in the data and it will only be implemented when there is no adverse effect of the change.It procedure helps in reducing the risk due to any modification made in data of a system. CCM process also take care of the confidentiality of data and integrity as well and helps inn maintaining it.Therefore the given statement is true.

8 0
3 years ago
Suppose there are 2 routers in sequence between Host A and Host B, all of which use store-and-forward routing. What is the total
lora16 [44]

Answer:

Check the explanation

Explanation:

Going by the question above,there are 2 routers in a sequence amid Host A and Host B and using store-and-forward routing.

So that time would conprise of both propagation delay and transmission time

Propagation delay is nothing but the time taken for traveling.

Transmission delay is the amount of delay time from the beginning to end of transmission)

Now,

Propagation delay = distance traveled / speed of propagation

= 161200 / 2.7 *108 = 59703703.70 * 10-8 mili sec

Transmission delay:

= packet size / bandwidth

= 4 / (9.1 * 1024) = 4.2925 * 10-1 mili sec

Let us assume routers have zero (0) processing time

total time = Transmission delay by host A + Transmssion delay by router1 + Transmssion delay by router2 + propagation time

= 3 * ( 4.2925 * 10-1 ) + (59703703.70 * 10-8)

= 1.28775 + 0.5970370370 ms

= 1.884787 ms

6 0
3 years ago
Write a function named "json_filter" that takes a JSON formatted string as a parameter in the format of an array of objects wher
7nadin3 [17]

Answer:

Check the explanation

Explanation:

kindly check the well written code below to get the solution to your question.

import json

def json_filter(input_string):

   jsonFormat = json.loads(input_string)

   result = []

   for obj in jsonFormat:

       if obj["temperature"] > 38.46:

           result.append(obj)

   return json.dumps(result)

7 0
3 years ago
Other questions:
  • The feature that sets Macs apart from other operating systems is the _____.
    6·2 answers
  • Which program has an indexed version of the NIST NSRL of MD5 hashes that can be imported to enhance searching for and eliminatin
    10·1 answer
  • When you start to type =av, what feature displays a list of functions and defined names?
    11·1 answer
  • How do you make electricity
    10·1 answer
  • In Windows, the log that stores events from a single application or component rather than events that might have system wide imp
    14·1 answer
  • What is the name of the technology that is typically implemented on switches to avoid Ethernet connectivity problems when the wr
    11·1 answer
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • MR. Tom asked her students could they plant a flower and bring it to class. Sarah brought his flower and said it was a rose. Jam
    6·1 answer
  • The physical parts of a computer are called application software.
    9·2 answers
  • ________ is a technique where the general characteristics are kept and the details are hidden.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!