1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
14

You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute

r is on another network, so you know data has to travel through one or more routers. The network technology on your network is Ethernet, but the technology on the destination network is Wi-Fi.
From what you have learned about networking, should this document transfer work?
Computers and Technology
1 answer:
Alex_Xolod [135]3 years ago
5 0

Answer:

Check the explanation

Explanation:

This document transfer ought to work smoothly. Due to the IEEE standards and Principles, the presentation layer is expected to encrypt/decrypt the data on both part of the network. The session layer creates a mutual coordination among the applications while the transport layer is there to ensures delivery. Immediately the segments hit the network, routers control and handle the routing process of the packets to the distant end. Layers 6, 3 & 1 are straightly involved in the italicized parts of the question; however, the entire layers play a role when looking at the transfer as a whole.

You might be interested in
What does it mean to use too much jargon in a slide presentation?(computer applications)
marin [14]
B.using too much jargon means you are using words that may be unfamiliar to the audience. <span>is the answer. jargon is</span><span> difficult words that others might not understand.</span>
8 0
3 years ago
Read 2 more answers
When choosing a buffer to use for an experiment conducted at pH 5.3, it would be best to choose one with a pKa of: A.2.14. B.4.7
s344n2d4d5 [400]

Answer:

B.4.75

Explanation:

Buffer solutions are the solutions which can resist the change in the pH up to some extent. They are the solutions of either weak acid and conjugate base of it or weak base and conjugate acid of it.

The pH of a buffer solution can be measured by the equation known as Henderson–Hasselbalch equation.

pH=pKa+log[base]/[acid]

A good buffer that buffer which has its acid's pKa within one pH unit of desired experimental conditions.

Thus, desired pH = 5.3

Preferable pKa = 4.3 - 6.3

<u>Answer - B. 4.75</u>

7 0
3 years ago
What do you need to do before you can sort and filter data in a database?
Airida [17]
You need to first format the table becfor you can sort and filter data in a <span>database. ♥</span>
5 0
3 years ago
âin order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely
faltersainse [42]
(keystroke) logger. I'm hoping this is what you wanted.
5 0
4 years ago
Need Help Please
erastova [34]

Answer:

1. siblings + 1

2. numberOfPizzas * pizzaCost

3. alienGreeting + alienGreeting2

4. color1 === color2

5. value1 - value2

6. console.log(gradeAverage === gradeAverage2)

7. numberToString + numberToString2

8. numberOfStudents / numberOfClassrooms

9. console.log(carSpeed === truckSpeed)

4 0
3 years ago
Other questions:
  • To open the format cells dialog box with the alignment sheet active, tap or click the alignment settings ____.
    8·1 answer
  • Suppose sum and num are int variables, and the input is 18 25 61 6 -1
    11·2 answers
  • While doing online research you enter this keyword search with a truncation character: man* Which of the following would not be
    15·1 answer
  • How to change the date modified on a word document?
    11·1 answer
  • Who wants to play nba 2k20 ps4
    5·2 answers
  • In which country did the World Cyber Games originate?
    9·2 answers
  • Which position most likely requires your Master's Degree for success
    7·1 answer
  • Suppose we have two threads inserting keys using insert() at the same time. 1. (5 points) Describe the exact sequence of events
    11·1 answer
  • Who developed the first personal computer called the altair
    15·1 answer
  • Your sister has just emailed you an attached file with the invitation list for her upcoming party.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!