Answer:
True is the correct Answer for the above question.
Explanation:
- Computer security is a security in which data of the computer is secured from the access of unauthorized users. It is primarily achieved to stop the access grant to the unauthorized user.
- It means that there is an authorization point which decides that the user is authorized or not. If the user is authorized then only he can enter the system otherwise he can not able to enter the system.
- It helps to secure the data and the data is the important point of the computer system.
- The question also states the same which is described above. Hence true is the correct answer.
Answer:
a) Yes
b) Yes
c) Yes
d) No
e) Yes
f) No
Explanation:
a) All single-bit errors are caught by Cyclic Redundancy Check (CRC) and it produces 100 % of error detection.
b) All double-bit errors for any reasonably long message are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.
c) 5 isolated bit errors are not caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit since CRC may not be able to catch all even numbers of isolated bit errors so it is not even.
It produces nearly 100 % of error detection.
d) All even numbers of isolated bit errors may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.
e) All burst errors with burst lengths less than or equal to 32 are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.
f) A burst error with burst length greater than 32 may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit.
Cyclic Redundancy Check (CRC) does not detect the length of error burst which is greater than or equal to r bits.
Answer:
If you want to view sites visited on a wireless network, you can check the logs stored by the wireless router to see what information is available. You may need to set your logging settings to capture the data you want.
Explanation:
Answer: Between Layers 2 and 3
Explanation:
In between Layer 2 and Layer 3 the MPLS header is present and is known as Shim header. It is also said to be in 2.5.