1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
12

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at t

he receiving application?
A) Application Layer.
B) Presentation Layer.
C) Session Layer.
D) Transport Layer.
Computers and Technology
1 answer:
lina2011 [118]3 years ago
3 0

Answer:

C) Session Layer.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Basically, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Session layer is the layer of an Open Systems Interconnection (OSI) model which describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.

You might be interested in
A personal computer system is composed of the processing unit, graphics board, and keyboard with reliabilities of 0.976, 0.785,
frosja888 [35]

Answer:

The answer to the following question is the option "B".

Explanation:

In computer science, the term Reliability is an attribute for any computer-related element like software or hardware. It consistently acts according to its terms. It has a lengthy process for considering one of three similar properties that must be analyzed when using a computer component. So the answer to this question is option B which is "0.684".

7 0
3 years ago
Prepare a document to list down at least 10 features/operations (on process and thread) you can do using Process Explorer.
leonid [27]

Answer:

The operations that can be carried out using process explorer include but are not limited to:

Explanation:

  1. Killing a Process Tree
  2. Ending or terminating a process
  3. Suspending a process
  4. Examining which process has locked a file
  5. Manually detecting a virus
  6. Unhiding a process. This can help to callup the window for a process that is not visible under normal explorer activities
  7. Monitor CPU usage
  8. setting the priority of a process
  9. changing a service process's access security
  10. Monitoring Graphics Processing Unit

Cheers

6 0
3 years ago
Given the following class, public class Magazine { private static double SUBSCRIPTION_DISCOUNT = .60; private String title;
jonny [76]

Answer:

The answer is "III only"

Explanation:

An accessor method is also an instance function that receives or establishes the value of an object's properties. This method is called methods through obtaining information about an entity. This method reverses it to process, which has two accessory string techniques to reach source string data reference length Accessor method.

6 0
3 years ago
Cómo se designaron los nombres de los elementos químicos​
professor190 [17]

Answer:

Berzelius (1779-1848) sugirió que la adjudicación de un símbolo por elemento consistiría en la inicial del nombre latino del elemento, seguida de otra letra incluida en el mismo nombre si ocurre una repetición, como ocurre, por ejemplo, con la símbolos de carbono, cloro y calcio.

8 0
3 years ago
16:9 and 4:3 are numbers that refer to an image’s...
lozanna [386]
These refer to an aspect ratio of an image.
6 0
3 years ago
Other questions:
  • On which tab are import and export commands located in Access? A. Home B. Database Tools C. External Data D. Create
    13·1 answer
  • Complexities of communication are organized into successive layers of protocols: lower-level layers are more specific to medium,
    8·1 answer
  • Which of the following is a command shell with a built-in scripting language?1. The Server Manager’s Roles and Features wizard2.
    11·2 answers
  • In the URL, what is the subdomain and what is the domain name?
    5·1 answer
  • What is the first step in devising security services and mechanisms?
    14·2 answers
  • A string variable can hold digits such as account numbers and zip codes.<br><br> FALSE<br><br> TRUE
    14·1 answer
  • Why can't I access my micro SD card on my Lenovo ThinkPad Yoga 11e? I'm trying to export some PNG files onto my Micro SD card, s
    6·1 answer
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • What programming language supports relational databases?
    15·1 answer
  • What is Virtual Storage Configuration and Management, as well as Virtual Machine Management?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!