1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Llana [10]
2 years ago
15

The Open Systems Interconnection (OSI) is a conceptual model whose purpose is to make networks more manageable. Its objectives i

nclude allowing for more portable hardware and software integration, the creation of standard interfaces that would allow manufacturers of different systems to interconnect their equipment and the creation of a model that would be used world-wide. There are seven layers to the OSI. The lowest - or first - layer allows a contiguous sequence of bits to be transmitted through the network. Which is the first layer: A. data-link layer, B. physical layer, C. network layer, D. transport layer
Computers and Technology
1 answer:
andrew-mc [135]2 years ago
6 0

Answer:

A. data-link layer

Explanation:

Data-link layer is the first layer and allows a contiguous sequence of bits to be transmitted through the network.

On top of it is the Network Layer and it handles the task of routing network messages from one computer to another.

Then comes the Transport Layer which is the basic layer at which one network computer communicates with another network computer.

You might be interested in
What cell phone technology is the most popular in the united states?
Alchen [17]
IPhone and Android. ....
3 0
3 years ago
Read 2 more answers
Suppose the price of a complement to LCD televisions falls. What effect will this have on the market equilibrium for LCD​ TVs? T
stiv31 [10]

Answer:

The equilibrium price of the LCD TVs will increase and the equilibrium quantity will increase.

Explanation:

When the price of a complement falls, the demand for the good increases so price and quantity increases.  

4 0
2 years ago
While developing a network application, a programmer adds functionally that allows her to access the running program without aut
Ierofanga [76]

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

5 0
2 years ago
Assume the following JavaScript program was interpreted using staticscoping rules. What value of x is displayed in function sub1
Annette [7]

Answer:

Static scoping: x is 5

Dynamic scoping : x is 10.

Explanation:

Static scoping :

In static scoping the variable of a function take the value within the function.

If there is no values exist within the function then take the global value of the variable.

var x // No value is assigned to x so it check global value of x

function sub1() {

   document.write(“x = “ + x + “”); // So it print x = 5

}

function sub2() {

   var x;

   x = 10;

   sub1();

}

x = 5; // It is the global value of x

sub2();

Static scoping: x is 5

Dynamic scoping :

In Dynamic scoping the variable of a function take the value all the calling function ends.

If the global value is the last assigned value of a variable then it take that value.

If there exist some other function after global variable value if that function contain the variable with some assigned value variable take that value.

var x

function sub1() {

   document.write(“x = “ + x + “”);

}

x = 5; // At this point x value is 5 and check there exist a function

sub2(); // So now call this function

function sub2() {

   var x;

   x = 10; // The value of x = 5 is replaced with x = 10

   sub1();

}

Dynamic scoping : x is 10.

7 0
3 years ago
Which devices typically generate computer output ?
Andrews [41]
Monitor , printer , speaker , projector , keyboard etc
6 0
3 years ago
Read 2 more answers
Other questions:
  • Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and
    7·1 answer
  • Conduct online research to determine specific conflict-resolution and management techniques and skills that would be beneficial
    5·1 answer
  • Operational feasibility, which refers to user acceptance and support, as well as management acceptance and support, is also know
    9·1 answer
  • Your supervisor has asked you to set up a RAID hard drive array in a tower system, which has a motherboard that uses the B360 ch
    10·1 answer
  • Among the following, which is the best protection against ransomware?
    8·1 answer
  • If you define a destructor, are you required to define an operator '=' and a copy constructor?
    9·1 answer
  • What is ambiguous grammar, explain in maximum 50words.
    5·1 answer
  • Yeah help me please......................
    9·1 answer
  • Is each of the following method identifiers (a) legal and conventional, (b) legal but unconventional, or (C) illegal?
    5·1 answer
  • Define a function Output Value() that takes two integer parameters and outputs the sum of all negative integers starting with th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!