1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Iteru [2.4K]
4 years ago
14

The checksum doesn't compute for a packet sent at the Internet Protocol (IP) level. What will happen to the data?

Computers and Technology
1 answer:
DENIUS [597]4 years ago
6 0

Answer:

As the data computed in the form of modules such as 23456, then every sixteen positions will have the same values. Checksum doesn't cover all the corrupted data over the network, so unchecked corruption does not occur due to undetected technique.

Explanation:

The checksum is the error detection technique used to determine the integrity of the data over the network. Protocols such as TCP/IP analyzed that the received data along the network is corrupted. Checksum value based on the data and embed frame. The checksum used a variety of data and performed many types of data verification. Files include the checksum and check the data integrity and verify the data. Both Mac and Window include the programs and generate the checksum. But sometime checksum does not detect the error over the internet and cause unchecked.

You might be interested in
MARK YOU THE BRAINLIEST!
AVprozaik [17]

1.) Over 3,000 corporations, charity groups, and government agencies reported data breaches. The majority of the accounts were exposed due to deliberate hacking, which accounted for 40% of the 5,000 occurrences.

2.) It drops By 20% within the 4 years. It goes at a steady pace then drops.

3.) It's a lot simpler. Everything, including databases, is now connected to the internet. This makes it much easier for anyone with the right skill set to access this data from anywhere in the world, with very little equipment or personnel, which is why data breaches caused by hackers are far more common than other types of incidents that would necessitate a lot more resources to access the same data.

4.) Another day, hackers claim responsibility for yet another big data leak. A hacker organization known as ShinyHunters said that it was auctioning 70 million sets of sensitive data reportedly obtained from AT&T only days after a breach at T-Mobile exposed roughly 53 million people's personal information. They are also interested in credit cards. If this trend continues, our social security and life will be jeopardized.

5.)Financial and payment systems have evolved over thousands of years, despite the fact that they are typically regarded of as new phenomenon. Over that time, the way transactions are carried out has changed dramatically, but the core goals have not. For instance, the economic tasks performed by Renaissance Italy's first modern banks are still relevant today.

Hope this helps took a while lol :)

4 0
2 years ago
Setting your __________ will prevent you from having to type your name in every email. autograph designation name signature
makvit [3.9K]
Signature I think.........

6 0
3 years ago
Read 2 more answers
Where on a computer is the operating system generally stored?
Brilliant_brown [7]

The operating system on a computer is generally stored at hard disk.

4 0
3 years ago
To transform information into _________, resources are used to discover patterns, rules, and context.
RSB [31]

Main Answer:

To transform information into<u> knowledge resources are used to discover patterns,rules,and context </u>

<u>Sub heading :</u>

<u>what is knowledge?</u>

<u>Explanation:</u>

<u>1.knowledge can be defined as awareness of facts or as practicals skills and may be als refer to familiarity with objects</u>

<u>2.knowledge of facts also referred to as propositional knowledge is often defined as true belief that is distinct from opinion</u>

<u>Reference link: </u>

<u>https//brainly,com</u>

<u>Hashtag: </u>

<u>#SPJ4</u>

<u></u>

3 0
1 year ago
Who is a u tuber that does fnaf stuff
Virty [35]

Answer:

i need points sry

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • To find and engage in Twitter conversations happening in specific geographical areas that are relevant to your company, you shou
    6·1 answer
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • Sandra wants to have her new technology up and running as soon as possible. She is looking for a tool that she can
    8·1 answer
  • Original phone call greeting for oncologist
    10·1 answer
  • If you arrive at the same time as another user straight across from you yield if ___.
    15·2 answers
  • What do you expect the future trends of an operating system in terms of (a) cost (b) size (c) multitasking (d) portability (e) s
    12·1 answer
  • How does porter’s competitive forces model help companies develop competitive strategies using information systems?
    13·1 answer
  • What are pixels?
    13·2 answers
  • Ms office suite comes with its own set of pictures in the​
    5·1 answer
  • What role does the automated surface observing system.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!