1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
5

What changes should be made in OSI model(Open System Interconnection).

Computers and Technology
2 answers:
saveliy_v [14]3 years ago
4 0

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

gulaghasi [49]3 years ago
3 0

Answer:

go darlin

Explanation:

You might be interested in
Sequentially prenumbered forms are an example of a(n): a. Processing control. b. Data transmission control. c. Input control. d.
Stella [2.4K]

Answer:

Sequentially pre-numbered forms are an example of a(n):

c. Input control.

Explanation:

  • Such a type of control in which keep updating data on the basis of monitoring of data is known as Processing Control. Data matching is an example of processing control.
  • Data Transmission Control is such a control in which transmission of data    is done. Parity check is an example of data transmission control.
  • Input Control is such type of control in which user can perform different tasks like adding text. Sequentially pre-numberered forms and turn around documents are an example of an input control.
  • Examples of Data entry control include batch total and validity check.

7 0
3 years ago
Select statements about Multiprocessors that are FALSE. a. Asymmetric multiprocessors are a popular form of tightly coupled arch
Inessa [10]

Answer:

The statement about Multiprocessors that is FALSE is:

a. Asymmetric multiprocessors are a popular form of tightly coupled architecture

Explanation:

Symmetric multiprocessors house two or more identical processors sharing a single main memory.  The multiprocessors are tightly coupled, and all of them can access all the connected devices without any preferential treatment of one over the others.  This is unlike asymmetric multiprocessors that do not share a single main memory.   Instead, they have distributed memories.

4 0
3 years ago
In traditional programming, probably the most often used error-handling outcome was to ____.Group of answer choicesterminate the
iVinArrow [24]

In traditional programming, probably the most often used error-handling outcome was to terminate the program in which the offending statement occurred.

<h3>What is a traditional programming?</h3>

Traditional programming is known to be a form of manual way that one or a user makes a program.

Note that in the case above, In traditional programming, probably the most often used error-handling outcome was to terminate the program in which the offending statement occurred.

Learn more about programming from

brainly.com/question/23275071

#SPJ1

4 0
2 years ago
4013
grigory [225]

Answer:

IM YOUR DADDY

Explanation:

5 0
3 years ago
Read 2 more answers
What is the name of the finned metal device that radiates heat away from the processor?
dezoksy [38]
This is called a "heat sink", essentially, a metal plate makes indirect <span>(its separated by thermal paste)</span> contact with the heat spreader of a cpu (central processing unit). The concept is that the heat sink is made of highly conductive materials thus conducting heat away from the CPU, quite often you'll find a fan attached to further disparate heat away from the heat-sink. These days you'll alternative cooling methods, the most common alternative is to use watercooling (another topic). GPU (graphic processing units) also have heatsinks.    
3 0
3 years ago
Other questions:
  • Under what conditions might the Justice Department approve a merger between two companies that operate in an industry with a pos
    14·1 answer
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • Where to set up wireless network xbox one?
    5·1 answer
  • Natural selection is a. how systems of rewards increase desired behaviors. b. the idea that the observable environment affects b
    6·1 answer
  • Why you should care about copyright
    13·1 answer
  • Which option is the strongest password?
    7·2 answers
  • An Oven Is Just A Spicy Refrigerator? Yes Or No??
    9·2 answers
  • To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted dec
    9·1 answer
  • After assembling a computer system the very first software to be installed is​
    10·2 answers
  • Please explain this code line by line and how the values of each variable changes as you go down the code.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!