1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
6

Ethernet ensures that _____ on a shared network never interfere with each other and become unreadable.

Computers and Technology
1 answer:
Dmitry [639]3 years ago
8 0

Answer:

Signals.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Ethernet ensures that signals on a shared network never interfere with each other and become unreadable through the use of encapsulation and standard encryption protocols.

In Computer Networking, encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

The TCP/IP model comprises of four (4) layers;

1. Application layer: this is the fourth layer of the TCP/IP model. Here, the data unit is encapsulated into segments and sent to the transport layer.

2. Transport layer (layer 3): it receives the segment and encapsulates it into packets and sends to the internet layer.

3. Internet layer (layer 2): packets are encapsulated into frames.

4. Network layer (layer 1): frames are then converted into bits and sent across the network (LAN).

Hence, the data unit encapsulated inside a packet is known as segment, which is typically referred to as packet segmentation.

Additionally, these data, segments, packets, frames and bits transmitted across various layers are known as protocol data units (PDUs).

You might be interested in
20121_GRPS_ELECTIVE_Computer Applications - Office 2016_A_IC
Nastasia [14]
= sign !!! Hope this helps
6 0
4 years ago
Read 2 more answers
List the memory units inside and outside of the CPU, along with short descriptions of their
Vitek1552 [10]

Answer:

RAM

ROM

Hard Drive

Registers(Accumulator, Address Register, Storage Register, General Purpose Register)

Explanation:

CPU(Central Processing Unit)  is the heart of the computer. it is useful for instruction execution . it mainly contains Control Unit (CU) and Arithmetic Logical Unit(ALU).

when CPU control unit wants to execute an instruction then it fetches the instruction from secondary memory(Hard Disk) to Main Memory(RAM) and read that from there. RAM is faster compared to Hard disk but it is not permanent storage. Useful to store data and instructions temporarily for execution.

when CPU performs Arithmetic and Logical Operations then it uses following registers to perform those operations. Register are a special type of  memory location which is costly and very faster. These are also temporary storage locations

Accumulator :Collects the result of computation.

Address register : which keeps track of where a given instruction or piece of data is stored in memory.

Storage register: which temporarily holds data taken from or about to be sent to memory.  

General-purpose register :which is used for several functions.

6 0
3 years ago
Big data are used to _____. Select 3 options.
Anon25 [30]

Answer:

Big data are used to _____. Select 3 options.

understand people’s hobbies

analyze people’s interests

make decisions about marketing

Explanation:

100%

8 0
3 years ago
Why is updating your anti-virus a good thing?
vladimir2022 [97]

Answer:

Antivirus vendors play a 'cat and mouse' game with malware creators. As malware is discovered definitions are written to discover the program and other programs written in a similar way. If an existing piece of malware is extensively rewritten or a new piece of malware is created, the existing malware definitions are unlikely to detect the program as malicious. This means that antivirus vendors have to find a 'sample' of the new malware being used and create a new definition for it. When you update your anti-virus these malware definitions are downloaded allowing your antivirus to detect this newer malware and keeps your computer secure from these newer threats.

7 0
3 years ago
Which answer best describes an unsubsidized federal loan
Leni [432]
<span>The best answer that describes an unsubsidized federal loan is A. You are responsible for paying all the interest that accumulates on your loan. Both subsidized and unsubsidized loans refer to the money that you get from the government in order to cover your school, or university costs that are usually very high. Usually, the terms are slightly better when it comes to subsidized loans, but if you can't choose - either is good. You will start paying your loans 6 months after you graduate or drop out.</span>
4 0
3 years ago
Other questions:
  • What type of memory can support quad, triple, and dual channels?
    5·1 answer
  • #Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
    11·1 answer
  • Data from RAM may be placed where to free up space?
    7·1 answer
  • IPv6 is being developed in order to:
    15·1 answer
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • Public classes are accessible by all objects, which means that public classes can be ____, or used as a basis for any other clas
    10·2 answers
  • Which utility is used to transform a standalone Windows Server 2012 R2 system into an Active Directory domain controller?
    6·1 answer
  • Which of the following is an object such as a field which can be inserted into a document
    7·1 answer
  • Animations<br> Animations are !<br> Blank which can be Applied to blank in a presentation?
    7·1 answer
  • On the worksheet, make cell a1 the active cell and then simultaneously replace all occurrences of the value 0. 05 with the value
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!