1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
5

What is a layer, in the context of this lesson?

Computers and Technology
2 answers:
pshichka [43]3 years ago
7 0

Answer:

A logical unit of a system.

Explanation:

i'm thinking your are talking about system layers such as the ISO? Layers help identify the order of how the whole system works.

kakasveta [241]3 years ago
4 0

Answer:

A logical unit of a system.

Explanation:

You might be interested in
Under the Home tab, controls for aligning text and objects can be found in the
lorasvet [3.4K]
I believe the answer is editing group
7 0
3 years ago
Read 2 more answers
A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
Black_prince [1.1K]

Answer:

A(n)  <u>Cipher</u> or crypto-system is an encryption method or process encompassing the algorithm, key(s) or crypto-variable(s), and procedures used to perform encryption and decryption.

Explanation:

  • Cryptography is such a technique that is used for the secure transfer of the information. We make codes for this purpose.
  • Cryptosystem is such a system in cryptography is simply an encryption method that has three algorithms. One algorithm is used for the generation of key, one for encryption and decryption.
  • Encryption is a process of converting the information in a data that is not understandable and decryption, this non-understandable data is converted into information so that we can read it.  
3 0
4 years ago
If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is:
gogolik [260]

Answer:

d

Explanation:

Because a decimal number

3 0
3 years ago
Any malware software that covertly gathers user information without the user s knowledge, is known as ______ .
shusha [124]
It be known as spyware
3 0
3 years ago
When you sign in to your Microsoft account with another Windows device, your settings will appear very differently than they do
djyliett [7]

Answer:

True

Explain:

All of the setting are device setting that dont follow your account.

3 0
3 years ago
Other questions:
  • Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
    6·1 answer
  • What type of cable would you use to connect two hosts together in a back-to-back configuration using twisted pair cable?
    15·1 answer
  • Differentiate between trusted-source-security and antispoofing-security techniques.
    10·1 answer
  • True or False
    11·1 answer
  • Please help explain this calculator code.
    15·1 answer
  • _____the measuring instrument is not necssery​
    10·1 answer
  • Two time series techniques that are appropriate when the data display a strong upward or downward trend are ___________ and ____
    14·1 answer
  • Lab 8-1: Working with Boot Loader and Runlevels what is the root password
    9·1 answer
  • Which of the following is an example of two-factor authentication?
    10·2 answers
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!