1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
13

To what would you compare the transport layer?

Computers and Technology
1 answer:
Nikolay [14]3 years ago
6 0
The above question has multiple choices as below

A. Data links
B. The post office
C. Driving a car
D. A train

The answer is (B) The Post Office.

In layman’s terms, transport layer is similar to the post office functions of delivering parcels and letters at the agreed delivery deadlines. It also notices any dropped info and re-transmits it.
Just like the post office, the transport layer directs messages and information between specific end users. If by mistake you write a letter to the wrong person, the letter will be returned and the postal employee will stamp it as address unknown.


You might be interested in
All of the following except one are issues that should be covered in an AUP. Which one is the exception?
Maslowich

Answer:

D) Your computer monitor will not switch on.

Explanation:

A written agreement or a document stipulating constraints and practices that a community computer network or an individual user must agree and adhere to is called an Acceptable Use Policy (AUP). Employees and students are required to sign an AUP when you sign up with an ISP. A good AUP will cover most provisions for network etiquette and indicate clearly the privacy levels of a member. The examples given in the multiple choices above are use cases for AUP apart from option D. If a user is not certain on the actions that should be taken in use cases like these, an AUP should be of great help.

6 0
3 years ago
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
3 years ago
The graph shows that sixty-eight percent of students think cyberbullying is a problem. One hundred human stick figures are shown
kari74 [83]

Answer:

C.

More students are affected by cyberbullying than not affected.

Explanation:

I got it correct on Edgenuity 2020.

8 0
3 years ago
Read 2 more answers
Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
xeze [42]
<span>Sarah learns she may only utilize SecNet 54 and SecNet 11 for transmitting classified information up to top secret.
</span>

SecNet 11 Plus is a family of encrypted <span>802.11b wi-fi <span>networking products. The Army has also approved</span></span> SecNet 11<span> as part of the classified Navy Marine Corps Intranet (NMCI) wireless solution. There are many products in SecNet 11 family, such as SecNet 11 Plus PC card, the SecNet 11 Wireless ridge, and the SecNet 11 Key Fill Cable etc.</span>

7 0
3 years ago
Which of the following can a cell contain?
Ksju [112]
The answer is choice D-All of these :)
8 0
3 years ago
Read 2 more answers
Other questions:
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • A ____ database supports data distributed across several different sites.
    7·1 answer
  • Which buttons should you use to publish and change a message on a message board
    6·2 answers
  • It is important to name your files in a variety of formats. true or false
    15·2 answers
  • Why is data processing done in computer?​
    14·1 answer
  • How does it transform your ways of socializing
    11·1 answer
  • . The electric company charges according to the following rate schedule: 9 cents per kilowatt-hour (kwh) for the first 300 kwh 8
    12·1 answer
  • நெறி என்னும் சொல்லின் பொருள்___ *​
    14·1 answer
  • Cleo is new to object oriented programming. which type of action can be taken on on object?
    14·2 answers
  • he wants to customize the operating system to meet his needs. what types of tools should he use, and what can he do with each?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!