Answer:
in direct speech, we convey the message of the speaker in his own actual words without any change to another person.
Explanation:
Answer:
Physical layer is the first layer of OSI model. The detail about physical layer and its parts is given below in explanation section.
Explanation:
The physical layer is the lowest and first layer of the Open Systems Interconnection Model (OSI). The physical layer is used for the transmission of data in bit forms. For transmission of data between devices, it uses the transmission medium that is either wired or wireless.
In the wired cable the component of the psychical layer include cable and connectors that are implemented for carrying data from one place to another or simply to transmit data between two connected devices. The wireless transmission medium is used to transmit data in the form of electromagnetic signals for carrying data into a stream of bits. Over past advancements in networking technologies, rapid growth has been seen in wireless data transmission and Wi-Fi and Bluetooth communication are few names of it.
Components/Parts of Psychical Layer
In the physical layer, the hardware components used it in are the network interface cards, connectors and interfaces, intermediate devices, modems, and cables to facilitate the transmission of data between devices or from source to destination.
- The network interface card (NIC)
NIC is a component installed in the computer to connect it to any available devices over the network.
- Connectors and Interfaces
Connectors and interfaces are used to connect cables that are being used for transmission of data from one source to another. The decision to choose connectors and interfaces depends on the type of cable. Typical examples are RJ-45, RJ-11, V.35, HDMI, etc.
Cables are the physical components of the physical layer that carry optic or electromagnetic signals for transmission of data from source to destination in the network.
The intermediate devices are hubs and repeaters etc. The functions of these devices are to amplify or generate the signal at the intermediate point in a network.
Answer:
The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.
The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.
Answer:
Teleconferencing is voice-only or audio and video communication, while video conferencing supports the conference by providing both video and voice, so you can fully see the person when you are listening to the communicator,
Teleconferencing is capable of transmitting the data during the conference, either using traditional PBX systems or VoIP, while video conferencing offers VoIP services. The formal requires less bandwidth, while the latter is highly dependent on network bandwidth.