1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
12

The Open Systems Interconnection (OSI) Reference Model: defines standards for many aspects of computing and communications withi

n a network. is a generic description for how computers use multiple layers of protocol rules to communicate across a network. defines standards for wireless local area network (WLAN) communication protocols. details the advantages and disadvantages of various basic network cabling options.
Computers and Technology
1 answer:
Advocard [28]3 years ago
8 0

Answer:

is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer.

2. Data link Layer.

3. Network Layer.

4. Transport Layer.

5. Session Layer.

6. Presentation Layer.

7. Application Layer.

Hence, the Open Systems Interconnection (OSI) Reference Model is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Additionally, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

You might be interested in
Which of the following best describes open source software?
sp2606 [1]
What was the options they gave you?
5 0
3 years ago
Read 2 more answers
Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation appl
IceJOKER [234]

HIPAA compliance regulation applies specifically to healthcare providers

c. HIPAA

<u>Explanation:</u>

HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA applies to specifically to healthcare providers.

It is a law which was designed to provide privacy standards to protect the patient's medical records, reports and other health information which may be sensitive or confidential provided to health plans, doctors, hospitals and other health care providers.

7 0
3 years ago
After a suspected identity fraud case has been resolved, you should: AContinue to monitor your credit reports and accounts. BKee
AysviL [449]
The answer is C. Both A and B because in the case of identity fraud it would make sense to monitor both
4 0
3 years ago
Read 2 more answers
What technology will I use when I become a surgical technologist?
otez555 [7]

Explanation:

Preoperative: Sterile Hands

The surgical technologist is the first person to enter the OR before surgery. During this preoperative phase the surgical technologist adheres closely to the following routine:

Carefully dons his or her operating room attire, including scrubs

Begins to prepare and sterilize the room

Gathers all of the equipment and surgical tools that the surgery requires

Sterilizes, counts and carefully arranges them

The most important part of this preoperative phase is creating and maintaining the OR’s sterile environment. Sterile fields can be compromised in a variety of ways, the most common of which is by introducing moisture. To prevent this, the surgical technologist is responsible for arranging dry drapes around the operating table and keeping all surfaces in a sterile condition.

Intraoperative: The Third Hand

During the intraoperative phase of the surgery, surgical technologists are still responsible for maintaining the sterility of the OR, but they also effectively become a “third hand” to the surgeon and surgeon’s assistant during the procedure and perform the following tasks:

Help prepare medications and administer them to the patient

Assist in retracting tissues from the patient

Passes the surgical tools to the surgeon and surgical assistant during the operation

At any time during an operation, if a tool is missing or contaminated, the delay or resulting infection could cost a patient his or her life. That is why surgical technologists must be diligent and thorough at all times.

Postoperative: Tying Things Up

As the operation concludes, surgical techs are responsible for the following:

Counting all of the tools and instruments used during surgery to ensure that nothing is left behind in a patient

Suture the incision and apply disinfected dressings to the area

Dispose of items such as needles and gauze, and continue to maintain the OR’s sterile environment until the patient is sent to the recovery ward

Thinking-On-Your-Feet: Cell Phones in the OR

While surgical techs aren’t expected to work miracles, they must be able to think quickly on their feet in emergency situations. During a recent hospital blackout and emergency generator failure, one quick-thinking surgical tech, with the help of the patient’s family member, rounded up enough cell phones to illuminate the OR while surgeons completed an emergency appendectomy.

3 0
2 years ago
Read 2 more answers
Whats the answer? true or false <br><br><br> I accidentally clicked false.
Anarel [89]

Answer:

false i think

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • In step 2 of the mail merge process you must be prepared to
    6·2 answers
  • Forwarded events can only be recorded when systems ADMINISTRATORS have de-established an event subscription. TRUE or FALSE
    15·1 answer
  • Lukas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of
    12·1 answer
  • The use of logistics software at DCS (7 points)
    5·1 answer
  • What characters cannot be used in a filename?
    15·1 answer
  • What is a ribbon in word
    15·2 answers
  • Which of the following statement is False? 1 point Context free language is the subset of context sensitive language Regular lan
    5·1 answer
  • Can someone please help me with 6.8 Code Practice adhesive.
    14·2 answers
  • Knowledge Spark, a school with no current job openings, wants to change to a completely virtual environment and offer classes to
    10·1 answer
  • a) pencil b) ink bottle c) polygon d) eye 3. Under which of the following can an operating system be classified? b) software c)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!