1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
2 years ago
7

A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/I

P) model is responsible for sorting the data to send email and web pages to the appropriate location?
a) Transport
b) Network
c) Data link
d) Application
Computers and Technology
1 answer:
Fudgin [204]2 years ago
6 0

Answer:

This is the second question like this I've seen. They aren't the greatest.

Explanation:

The question is not good. The answer would be option a, Transport even though it doesn't make a whole lot of sense when you really go into detail.

It could also be option d, Application but I think they're going for the first.

You might be interested in
What would 128 kbps look like on a phone? i.e. 4g, 3g, 2g, etc
vovangra [49]
5g I think.............
8 0
3 years ago
7.6 lesson practice edhesive
grigory [225]
There is a equal amount I guess free points for me
5 0
3 years ago
Read 2 more answers
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
3 years ago
Suppose that a minus sign in the input indicates pop the stack and write the return value to standard output, and any other stri
Sergio [31]
It’s b just really got to make since an read it right that’s all
7 0
3 years ago
Read 2 more answers
All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym
RoseWind [281]

Answer:

Data use policies

Explanation:

Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.

4 0
3 years ago
Other questions:
  • A Pool charges $4 each visit,or you can buy a membership. Write and solve an inequality to find how many times a person should u
    5·1 answer
  • Greg works for an online games development company. He is not a net freak, but occasionally he visits online literature sites an
    7·1 answer
  • A ____ is a type of program that uses a grid to organize and work with data.
    14·1 answer
  • DNA is the fundamental encoding of the instructions that govern the operation of living cells and, by extension, biological orga
    5·1 answer
  • Pseudocode is an improvement over the IPO chart because it lays out the a0 sequence of steps for a particular program.
    6·1 answer
  • When a Python program is reading a file, the data is input as plain ASCII characters in a string. What is the following code doi
    15·1 answer
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • Describe at least one issue of terrorism that has happened recently.
    14·1 answer
  • How would you design an adaptive environment for people who are blind?
    10·1 answer
  • Write a program that asks the user for the name of a file. The program should display the contents of the file with each line pr
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!