1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
3 years ago
11

The entirety of a packet at one Layer becoming the payload section at another is know as?

Computers and Technology
2 answers:
MA_775_DIABLO [31]3 years ago
8 0
The answer to the question is: encapsulation
finlep [7]3 years ago
6 0

Answer:

The entirety of a packet at one Layer becoming the payload section at another is know as <u>Encapsulation</u>

<u>Explanation:</u>

Encapsulation can be defined  as a strategy for planning secluded correspondence conventions in which sensibly separate capacities in the system are disconnected from their basic structures by incorporation or data covering up inside more elevated amount objects

You might be interested in
Rules used in naming variables in object oriented programming​
schepotkina [342]

Answer:

Explanation: Name your variables based on the terms of the subject area, so that the variable name clearly describes its purpose.

4 0
3 years ago
A router has a valid operating system and a configuration file stored in nvram. the configuration file contains an enable secret
Makovka662 [10]
The answer is user EXEC mode. This is for setting, viewing, and testing system processes. In common, the user EXEC commands let you to link to remote devices, modify terminal line settings on a temporary basis, perform basic tests, and list system information. This also used by common system administrators, while the privileged EXEC mode is used by the root administrator. Use the enable and disable instructions to shift between the two levels. Access to the user-level EXEC command line needs a valid password.
8 0
3 years ago
Where is permanent data in the computer stored? Whenever Jim starts his laptop, he sees some commands and numbers appearing on h
Wittaler [7]

the operating system ithink

4 0
4 years ago
What is an ad's target audience composed of
solmaris [256]
C. An ad targets an audience the creators hope will but the product.
3 0
4 years ago
Which technique is used for overcoming the CPU Waiting Time Problem of
PIT_PIT [208]

Answer: Its a method of transferring data between the CPU and a peripheral, such as a network adapter or an ATA storage device. Each data item transfer is initiated by an instruction in the program, involving the CPU for every transaction.

Explanation: idk if this helps but hope it does

8 0
3 years ago
Other questions:
  • Select the correct answer.
    7·2 answers
  • The World Wide Web consists of interconnected computer networks throughout the world that everyone can use. True or False
    13·2 answers
  • zeroIt is a function that takes one argument and returns no value. The function stores the value 0 back into the parameter. x is
    8·1 answer
  • Given the three side lengths, how can you tell if a triangle<br>is a right triangle?​
    5·1 answer
  • Which of the following software maintenance steps erases gaps caused by deleting files from the hard drive?
    10·1 answer
  • A user input is when the user interacts with the program by typing.<br> True<br> False
    11·2 answers
  • State any three points of importance of local level profession​
    11·1 answer
  • .... . .-.. .-.. --- .-.-.-<br><br><br> TRANSLATE THAT.
    10·1 answer
  • Please Answer Quickly.<br> Match the item on the left with the reason that it is false on the right.
    9·1 answer
  • 1. what is the purpose of giving an id to an html element when using javascript?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!