1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
5

What changes should be made in OSI model(Open System Interconnection).

Computers and Technology
2 answers:
saveliy_v [14]3 years ago
4 0

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

gulaghasi [49]3 years ago
3 0

Answer:

go darlin

Explanation:

You might be interested in
Employee names are stored using a maximum of 50 characters. This information is an example of which of the following?
enyata [817]

Answer: Data model

Explanation: Data model is the arrangement of the information in the form of table structure to maintain it in the form of database.They help in the keeping the entities in the sequence and can be tracked when required.Example- vendors records,customer record etc.

Other options are incorrect because the data retrieval is the regaining of the data from database, record instance is the parts of the database records  and meta data give knowledge about other data.

8 0
4 years ago
Sally needs to teach her class how to convert a decimal number to a binary number. What is the first step she should take to sta
Alborosie

<u>Answer:</u>

  • <em>A. divide the decimal number by the base value 2</em>
  • <em>C. note the remainder separately</em>
  • <em>D. divide by 2 until she gets 0 as the remainder</em>
  • <em>B. collect the digits in the reverse order</em>

<u>Explanation:</u>

When we want to convert decimal number to a binary number first we have divide the given number by 2. The next step is to note the reminder of the number in the side every division so that the reminder value is the binary value. Repeat this until an zero is encountered.

We have to collate all the remainders from last of first and then the collated number is the answer for the given problem.

<em>So the given option can be ordered as, </em>

  • <em>A</em>
  • <em>C</em>
  • <em>D</em>
  • <em>B</em>
6 0
4 years ago
Suppose an AI scientist designed a robot to ring an alarm for food. If the clock strikes 1, the robot displays a message “Time f
Rudik [331]

Suppose an AI scientist designed a robot to ring an alarm for food. If the clock strikes 1, the robot displays a message “Time for lunch.” It displays such messages at breakfast and dinnertime, too. What kind of agent is the robot?

A. model-based reflex agent

B. goal-based agent

C. utility-based agent

D. simple reflex agent

4 0
2 years ago
Read 2 more answers
Which of the following code segments will display all of the lines in the file object named infile, assuming that it has success
zimovet [89]

Answer:

d.

for line in infile :

   print(line)

Explanation:

for loop is used to iterate through the each line of the file using line variable. The file is accessed using the object infile. For example if the file name is "file.txt" and it is opened in read mode. It contains the following lines:

hi there friend

how are you

what are you doing

Then the above given chunk of code gives the following output

hi there friend

how are you

what are you doing

At each iteration each line of the the file is printed on the output screen. The print() method is used to display these lines in output.

5 0
3 years ago
Which sentance has correct capitalization? A) I can't wait for fall to come because I love Halloween. B) I can't wait for Fall t
nordsb [41]

Answer: should be A i think because the word “fall” does not require capitalization.

Explanation:

3 0
3 years ago
Other questions:
  • You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
    12·1 answer
  • the piece of hardware that contains the circuitry that processes the information coming in to the computer and tells the other h
    5·1 answer
  • Suppose we have an arrayAofnprofessors; each teacher has two characteristics: difficulty (a numberin the range [0,10], where a h
    7·1 answer
  • A virus that propagates using the internet or another computer network is called __________.
    10·1 answer
  • A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooti
    10·1 answer
  • An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The pho
    12·1 answer
  • A_______ to show the working of an object before it is built or made. A. Prototype b. Test c. Evaluation d. Plan
    10·1 answer
  • the following names are considered valid names for variable except for a. ST_Name b. ST name c. STName​
    9·1 answer
  • A proposal is also known as a
    14·2 answers
  • Before radio, many minority musicians were severely limited by the prejudice of the era. true o rfalse
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!