1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
5

What is a layer, in the context of this lesson?

Computers and Technology
2 answers:
pshichka [43]3 years ago
7 0

Answer:

A logical unit of a system.

Explanation:

i'm thinking your are talking about system layers such as the ISO? Layers help identify the order of how the whole system works.

kakasveta [241]3 years ago
4 0

Answer:

A logical unit of a system.

Explanation:

You might be interested in
Sam needs to create a spreadsheet for his coworkers. They will need to follow across a long row of data. Sam would like to make
castortr0y [4]
The answer youre looking for is A.
3 0
3 years ago
Read 2 more answers
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
2 years ago
To resize an embedded chart, ____. select one:
Mrrafil [7]
I think its ' D ' ,You can use both A and B
5 0
3 years ago
An Accenture healthcare client is interested in implementing an Artificial Intelligence solution to improve patient care but, is
Evgesh-ka [11]

Answer:

the best course of action would be to hold a demonstration for them

Explanation:

For individuals/clients that do not understand the technology, the best course of action would be to hold a demonstration for them. Set up a meeting with the client and show them a demonstration of the Artificial Intelligence solution/software in person. Allow them to see what the software can do in a test environment and answer any and all questions that the client may have. This will allow the client to get an idea of how the solution can benefit them and also clear up any doubts/fears that they may be having regarding implementation. This would be the best way to bring such a client onboard.

4 0
3 years ago
A ____________ is the intersection of a column and row in an excel spreadsheet.
kogti [31]

Answer:

a cell is the intersection of a column and row in an excel spreadsheet.

4 0
3 years ago
Other questions:
  • When uninstalling software, it is best to delete the folder containing the software?
    11·1 answer
  • Brad Smith works for GHI Firm. GHI firm is a registered Broker-Dealer in State A, B and C and a registered IA in State A. Brad i
    10·1 answer
  • what tool can a student use to make sure his or her work paper does not take credit for someone else's work ?
    5·1 answer
  • Identify a factor that is unlikely to influence the length of time people wait in the lunch line.
    8·2 answers
  • Write a C# solution for the following problem. Submit your .cs file to this link. Sample output(s) attached. == Create an Employ
    5·1 answer
  • What is the output of doublec= 12.0 / 5 Systemoutprintln (c)
    8·1 answer
  • As marketing manager, you need to have ( blank) skills and (blank) skills.
    11·1 answer
  • What is Fill handle?
    12·1 answer
  • c) If you are at foreign country visit, which banking card would you prefer to keep with you during visit (Debit Card or Credit
    10·1 answer
  • Read each of the following statements about Computer Science and explain why you think that statement is true.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!