1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
3 years ago
11

The entirety of a packet at one Layer becoming the payload section at another is know as?

Computers and Technology
2 answers:
MA_775_DIABLO [31]3 years ago
8 0
The answer to the question is: encapsulation
finlep [7]3 years ago
6 0

Answer:

The entirety of a packet at one Layer becoming the payload section at another is know as <u>Encapsulation</u>

<u>Explanation:</u>

Encapsulation can be defined  as a strategy for planning secluded correspondence conventions in which sensibly separate capacities in the system are disconnected from their basic structures by incorporation or data covering up inside more elevated amount objects

You might be interested in
Amanda wants to prevent sensitive data from being sent via email in her organization. What type of agent software can she instal
melamori03 [73]

The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.

<h3>What are some ways to handle against email phishing attacks?</h3>

People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:

  • Be on guard towards the  handing of sensitive information.
  • Never click on alarming messages.
  • Do not open any form of attachments that is suspicious or strange.

Learn more about  phishing attacks from

brainly.com/question/2537406

8 0
2 years ago
Servers that exist within a data center that is publicly accessible on the internet are referred to as on-premises servers.
adoni [48]

Servers that exist within a data center that is publicly accessible on the internet are referred to as on-premises servers: b. false.

<h3>What is a server?</h3>

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

<h3>What is an on-premises server?</h3>

An on-premises server can be defined as a type of server that are privately owned by a company or individuals, which must be managed and maintained individually.

In conclusion, servers that exist within a data center that is not publicly accessible on the internet are generally referred to as on-premises servers.

Read more on servers here: brainly.com/question/27960093

#SPJ1

7 0
2 years ago
Which of the following method calls are legal?a. mathMethod(x);b. mathMethod(y);c. mathMethod(x, y);d. mathMethod(x + y);e. math
Roman55 [17]

Answer:

Option a, b, d, f, and j is legal method calls.

Explanation:

In the given question some information is missing, that is the method definition which can be described as follows:

Method definition:

int x =2, y=3; //defining integer variable

int mathMethod (int x)  //method definition

{//method body

int z=x+y; //calculate value

return z;  //return value

}

In the given question option a, b, d, f, and j  is legal, because these options follow the correct syntax, and other option were incorrect which can be defined as follows:

  • In option c, It is illegal because it accepts only one parameter.
  • In option e, It is accepts long number, that's why it is illegal.
  • In option g, It accepts float value, that's why it is illegal.
  • In option h, It doesn't accepts any parameter.
  • In option i, It isn't use in method.
7 0
3 years ago
A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while
lys-0071 [83]

C. OS hardening.

Making an operating system more secure. It often requires numerous actions such as configuring system and network components properly, deleting unused files and applying the latest patches.

The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing all non-essential software programs and utilities from the computer.

5 0
3 years ago
MTINGAENL ....
erik [133]

Answer:

Alignment

Explanation:

7 0
4 years ago
Other questions:
  • Which two computer peripherals are connected to the computer through a port?
    9·1 answer
  • Advantage and disavantage of malware maintenance
    12·1 answer
  • Is it better to meet online or offline<br> (Please answer QUICK)<br><br> Thanks :')
    5·2 answers
  • Which is an advantage that electronic scheduling tools have over paper calendars?
    13·2 answers
  • Select the best word or phrase to complete each sentence Jobs that require you to use your v are typically rewarding Individuals
    12·1 answer
  • Why do most laptops have LCD rather than OLED displays, which are found on mobile devices?
    14·1 answer
  • In news writing, which is bigger , a topic or a angle
    10·1 answer
  • Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorilla
    6·1 answer
  • Discuss how a lack of infrastructure in poor communities could contribute to ill-health such as the Unrest looting.​
    9·1 answer
  • Frequently used _____________ can be saved as _____________ for use in analysis, dashboards, reports, tickets, and alerts.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!