1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
2 years ago
12

The Open Systems Interconnection (OSI) Reference Model: defines standards for many aspects of computing and communications withi

n a network. is a generic description for how computers use multiple layers of protocol rules to communicate across a network. defines standards for wireless local area network (WLAN) communication protocols. details the advantages and disadvantages of various basic network cabling options.
Computers and Technology
1 answer:
Advocard [28]2 years ago
8 0

Answer:

is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer.

2. Data link Layer.

3. Network Layer.

4. Transport Layer.

5. Session Layer.

6. Presentation Layer.

7. Application Layer.

Hence, the Open Systems Interconnection (OSI) Reference Model is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Additionally, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

You might be interested in
What is the outcome of using the formula =AVERAGE(A12:A20)?
balu736 [363]
Well according to the name of the function, I would say <span>A) the mean value of a set of numbers</span>
6 0
2 years ago
Read 2 more answers
Display all 3-digit automorphic no.s.<br>Guys I need help!!!!!!<br>I WILL GIVE THE BRAINLIEST ❤️​
pshichka [43]

Answer:

hope my answer helps

Explanation:

Automorphic Number

Given a number N, the task is to check whether the number is Automorphic number or not. A number is called Automorphic number if and only if its square ends in the same digits as the number itself.

Examples :

Input : N = 76

Output : Automorphic

Explanation: As 76*76 = 5776

Input : N = 25

Output : Automorphic

As 25*25 = 625

Input : N = 7

Output : Not Automorphic

As 7*7 = 49

8 0
2 years ago
Read 2 more answers
Demi loves playing online games. She surfs through many websites to find new, interesting games. One day she finds that her mail
Marianna [84]

Answer:

Option (B) is the correct answer.

Explanation:

The following terms are as follows:

Firewall: Firewall can be described as a security system for a network, which is used to check the incoming and outgoing data on the network on the basis of rules determined by the system.

Spyware: Spyware defines as a program that can record your activity secretly and then use it for many purposes i.e advertisements, promotions, and many other legal and illegal purposes.

Bastion host: Bastion host mainly used to access the private network from any other network.

Attack trees: Attack trees are used to examine the security of any system against any attacks.

According to the scenario, the most appropriate answer is option (B) because spywares are also used for promotion.

4 0
3 years ago
List and define the seven criteria for evaluating communication theory
Nataly [62]
Theoretical Scope 
<span>How general is the theory? That is, how widely applicable is it? In most cases, a theory that may only be applied within a fairly narrow set of circumstances is not considered as useful as a theory that encompasses a very wide range of communicative interactions. The ideal, of course, is a theory that succinctly explains the nature of human communication as a whole.

</span>Appropriateness 
<span>Theories are often evaluated based upon how well their epistemological, ontological, and axiological assumptions relate to the issue or question being explained. If a theory recapitulates its assumptions (if it is tautological), it is not an effective theory.

</span><span>Heuristic value
 <span>Some theories suggest the ways in which further research may be conducted. By presenting an explanatory model, the theory generates questions or hypotheses that can beoperationalized relatively easily. In practical terms, the success of a theory may rest on how readily other researchers may continue to do fruitful work in reaction or support.
</span></span>
<span>Validity 
<span>It may seem obvious that for a theory to be good, it must also be valid. Validity refers to the degree to which the theory accurately represents the true state of the world. Are the arguments internally consistent and are its predictions and claims derived logically from its assumptions? Many also require that theories be falsifiable; that is, theories that present predictions that--if they prove to be incorrect--invalidate the theory. The absence of such questions significantly reduces the value of the theory, since a theory that cannot be proven false (perhaps) cannot be shown to be accurate, either.</span>
<span>Parsimony 
<span>The law of parsimony (Occam's razor) dictates that a theory should provide the simplest possible (viable) explanation for a phenomenon. Others suggest that good theory exhibits an aesthetic quality, that a good theory is beautiful or natural. That it leads to an "Aha!" moment in which an explanation feels as if it fits.</span>
Openness <span>Theories,
perhaps paradoxically, should not exist to the absolute exclusion of other theories. Theory should not be dogma: it should encourage and provide both for skepticism and should--to whatever degree possible--be compatible with other accepted theory.</span></span></span>
4 0
3 years ago
One of the innovative features introduced by the macintosh system was
EastWind [94]
A of course with the first graphical interface for personal computer
8 0
3 years ago
Other questions:
  • Windows server 2012 r2 includes hyper-v in which edition(s)?
    12·1 answer
  • Holly would like to run an annual major disaster recovery test that is as thorough and realistic as possible. She also wants to
    5·1 answer
  • The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
    15·1 answer
  • 1. Implement a method factorial(int n), that takes a number (int) and returns its factorial. Factorial of an integer is the prod
    13·1 answer
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • I WILL GIVS BRAINLIEST IF U ANSWER THIS
    9·1 answer
  • ( BRAINLIEST) <br> Name 2 input devices and 2 output devices on a smart phone.
    12·1 answer
  • A leading global vendor of computer software, hardware for computer, mobile and gaming systems, and
    5·1 answer
  • Which of these is most likely to contribute to the long term of a local ecosystem?
    5·1 answer
  • One word for The characters typed by a user using a<br> keyboard.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!