Answer:
a. 0.01
b. 0.001
c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.
Explanation:
The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;
= 0.1 x 0.1 = 0.01
When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;
= 0.01 x 0.1 = 0.001
The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.
Answer:
B) Keyloggers
Explanation:
Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.
Answer:
1) the wireless standards that can be implemented are; IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and IEEE 802.11n. The pros and cons are in the attachment
2) 802.11g can be implemented in alice's restaurant. This is because it provides the fastest speed and has a wide range which will not be easily disturbed by other devices
3) Please check the attachment
4) Please check the attachment.
Explanation:
Answer: Launch AnyGo. Once you download the AnyGo latest version, you can double click on the setup and install it on your PC.
Connect iPhone to the PC. Now take your iPhone and connect to the PC that you installed, AnyGo. ...
Check the current location. ...
Find the destination. ...
Teleport to the location. ...
You already wrote the answer. It is Additions