Answer:
Broadcast message
Explanation:
The network models like OSI and TCP/IP suites have standard layers and protocols that governs the communication of end devices in a network.
The TCP/IP suite model has four layers which are application, transport, internet and network access layers. The network access does the work of both the data-link and physical layer of the OSI model.
When the packet is encapsulated in a data-link header and trailer, and needs to be sent to another unknown host, a broadcast message is sent to all the computers in the network to retrieve the remote host address for a unicast transmission to take place.
Answer:
STP mainly uses 5 states in a network, in which some states are replaced in RSTP which improves the time efficiency.
Explanation:
STP mainly uses five states i.e. Learning, Listening, Blocking, Disabling and Forwarding to overcome the problem of collision in a network.
RSTP replaced the three states of STP i.e listening, learning, and blocking by Discarding, which results in the time efficiency as compared to STP.
As STP takes minutes to complete the network inter connectivity, RSTP completes it in seconds.
This is one of the main reason why an administrator want to change to RSTP.
You should change the name of the function
Answer:
El consumo del taller es de 3.7 kw/h.
Explanation:
Dado que el taller posee dos taladros de sobremesa de 600 vatios de potencia, que son utilizados durante 2 horas diarias; una sierra de calar de 500 vatios de potencia que es utilizada durante 1 hora diaria, y cuatro soldadores de 50 vatios que se utilizan durante 4 horas diarias, para medir el consumo diario de energía del taller es necesario realizar el siguiente calculo:
600 x 2 x 2 = 2,400 vatios de consumo taladros
500 x 1 x 1 = 500 vatios de consumo sierra de calar
50 x 4 x 4 = 800 vatios de consumo soldadores
2,400 + 500 + 800 = 3,700 vatios de consumo total
Pasado a kilovatios, el consumo del taller es de 3.7 kw/h.
Answer:
Option C is the correct answer for the above question.
Explanation:
Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.
The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-
- Option A states about direct mail which is not a type of attack.
- Option B states about instant messaging which is also not a type of attack.
- Option D states about spam which is used to send the spam messages.
- Option 'E' states about the mass mail which is used to send the lots of spam mail.