which term does the Ethernet protocol use to describe the pieces of a message sent accross a network?

Answers

Answer 1

Systems interacting over Ethernet break a data stream into shorter parts known as frames.

Each frame contains source and destination addresses, as well as error-checking data, which allows broken frames to be discovered and discarded; most of the time, higher-layer protocols initiate the retransmission of lost frames.

The Ethernet protocol is a common LAN technology. Ethernet-based local area networks may carry data at speeds of up to 10 Mbps. Fast Ethernet Ethernet cards represent high-speed LAN technology, with data transmission speeds of up to 100 Mbps.

Learn more about Ethernet protocol here:

https://brainly.com/question/31869816

#SPJ4


Related Questions

who is responsible for information security at Infosys?

Answers

The information security council is responsible for information security at Infosys.

Where can you find the Infosys information security policy?

It is accessible by all employees and can be accessed in InfyMe Web under the 'Policy' section within the Information Systems (IS) portal (InfyMe web - > World of Infosys - > Business Units and Subsidiaries - > Information Systems - > Repository - > Policies).

The Information Security Council (ISC) is the governing body at Infosys that focuses on establishing, directing, and monitoring our information security governance framework.

Therefore, the information security council is responsible for information security at Infosys.

To learn more about the Security council, refer to the link:

https://brainly.com/question/97111

#SPJ1

pls help
urgent questions please​

pls helpurgent questions please

Answers

Answer:

1 - CLI

2- GUI

3-CLI

4- CLI

Which of the following are examples of injection attacks? Check all that apply.
SQL injection attack
Social engineering attack
XSS attack
SYN flood attack

Answers

Answer:

SQL injection attack and XSS attack are examples of injection attacks.

A SQL injection attack is a type of attack that involves injecting malicious code into a website's SQL database through user input fields, such as a login form or search bar. This type of attack can allow an attacker to access sensitive information stored in the database, modify or delete data, or even take control of the database server itself.

An XSS (Cross-Site Scripting) attack is a type of injection attack that involves injecting malicious code (usually in the form of a JavaScript script) into a website. This type of attack can be used to steal sensitive information, such as login credentials or financial information, from users of the website.

Social engineering attacks and SYN flood attacks are not examples of injection attacks.

A social engineering attack is a type of attack that involves manipulating or tricking people into divulging sensitive information or performing actions that may not be in their best interest. This can be done through various means, such as phishing emails, phone calls, or in-person interactions.

A SYN flood attack is a type of denial-of-service (DoS) attack that involves sending a large number of SYN (synchronize) packets to a target server in an attempt to overwhelm it and prevent it from processing legitimate requests. This type of attack is typically carried out by exploiting vulnerabilities in the TCP/IP protocol stack.

Explanation:

In a _error,solution is working but not giving required results

Answers

Answer:

it is a random error

Explanation:

I HOPE THAT THIS ANSWER HELPS YOU

Topic: Video Games.


What game is the song "Lost in Thoughts all Alone" from? I will give you a hint: It's a JRPG.


Please...No links or gibberish.

Answers

Answer:

Fire Emblem

Explanation:

Which of the following is true of a procedure? Check all that apply.

It can be reused.

It saves programmers time.

It is a block of code that performs a single task.

It lets you exit a function.

Answers

Answer:

It can be reused, It saves programmers time, it is a block of code that performs a single task.

Explanation:

Website designers work on the code and programming of a website, not the style or layout of the site.

Answers

Answer:

False

Explanation:

Website designers design how the site looks not works

what statement is an accurate description of the concept of polymorphism in object-oriented programming? polymorphism is allowing the several different classes to use the same general method names. polymorphism is the restricting of the manipulation of an object's state by external users to a set of method calls. polymorphism is allowing a class to automatically reuse and extend the code of a similar but more general class. polymorphism is the use of code that is capable of making changes to itself during the execution process.

Answers

The use of the same generic method names by numerous different classes is made possible via polymorphism.

Encapsulation in object-oriented programming (OOP) refers to the restriction of direct access to parts of an object's components or the bundling of data with the methods that operate on that data. The element is repeatedly inserted into the first I elements of the list using the insertion sort method. A characteristic of object-oriented programming languages called polymorphism enables a particular function to use variables of various types at various points. A program's ability to redefine methods for derived classes is made possible via polymorphism. When a function is called, an argument is supplied to it and is referred to as a parameter in the function declaration.

Learn more about polymorphism here-

https://brainly.com/question/13776652

#SPJ4

Describe the major features of super computer

Answers

Answer:

large and operate at a high speed

A high speed low latency iterconnect
Large quantities of FLOPS (Floating Point Operations)
A large high throughput filesystem
The software infrastructure needed to write and run codes that utilize the system
Significant power and cooling infrastructure

why is video game addiction a real problem?​

Answers

Video game addiction is a real problem because it starts interfering with school and other activies such as spending time with family, or being active. It slowly starts taking away your motivation to do anything else and all you want to do is play the game

Well, truthfully there is no such thing as video game addiction.

You see, playing video games is fun, and sure, sometimes some kids (or adults sometimes too) like to play for a lot longer than others would like them to, however, video gaming is a very good thing in many cases. You see, for example, there are gamers who have made a very large impact on the definition of success. Like Jaden Ashman (he was born in the UK) who won the Fortnite World Cup, and signed a contract with the Fortnite team Lazarus. This made Jaden earn over $60,000 a year. Parents and other people may believe that kids can be addicted to video games, but there have always been the people who prove them wrong. We as people get our own assumptions of what is or isn't addicting, video games among them, but we (the younger generation of gamers) know more insight than those others. People just need to re-define the definition of addiction.

Hope this helps and have a nice day.

-R3TR0 Z3R0

How do you describe packet switching in your own words

Answers

Answer:

this is your answer bhaiya

How do you describe packet switching in your own words

help me please help help

help me please help help

Answers

Answer:

C

Explanation:

The concept of superheros

Answer: C.

Explanation:

cause that concept is oooooooooooooooooooooooooooooold

Computer science student Jones has been assigned a project on how to set up sniffer. What must he keep in mind as part of the process

Answers

Setting up a sniffer requires certain considerations to be taken into account, such as ensuring that the sniffer is being used legally, selecting the appropriate hardware and software for the task, and configuring the sniffer correctly to capture and analyze network traffic.

The use of a sniffer or packet analyzer can be subject to legal restrictions and ethical considerations, as capturing and analyzing network traffic may violate privacy laws or ethical norms. As such, Jones needs to ensure that the use of the sniffer is authorized and that he is aware of any legal or ethical considerations that may apply.

When selecting hardware and software for the sniffer, Jones should consider factors such as the intended use of the sniffer, the complexity of the network, and the level of analysis required. Different sniffer tools may be better suited for different tasks, such as capturing traffic on wired or wireless networks, analyzing specific protocols, or detecting security threats.

Once the hardware and software have been selected, Jones needs to configure the sniffer correctly to ensure that it is capturing the desired traffic and providing accurate results. This may involve setting filters to capture specific types of traffic, configuring the interface to ensure that packets are being captured properly, and adjusting the settings to optimize the performance of the sniffer.

To learn more about Sniffer, visit:

https://brainly.com/question/29872178

#SPJ11

How do you manage your online presence? What kind of sites are you most active on, and what steps can you take to manage your image on these sites better?

Answers

Answer:

1. optimize your website to increase your online visibility and other search engines.

2. make your company information clear and prominent.

Though obvious, it's surprising how many businesses neglect to do make it easy to locate their business information. You should show:

company name

location, including city and state

contact information

overview of products and services

operating hours

3. provide useful content in your page

PLS HELP
1. You can tape a movie off Showtime.
a. if you use it for educational purposes.
b. only if you have written permission from the company.
c. so that it may be archived.
d. to use as an entertainment for your great students.

2. You may photocopy parts of the encyclopedia:
a. if it is for your use only.
b. only if your copy is of the subject you are researching.
c. if you don’t have a copy at home.
d. to pass out to all your students.

3. You may record a local symphony concert to share with your class:
a. as long as you don’t sell tickets to hear it.
b. as long as you use it at a listening center in your room.
c. if you relate it to your lessons.
d. you may not record a public performance of any kind.

4. You may make a copy of a computer program:
a. if you are giving it to a friend.
b. as long as you purchased it and are using it for a back-up copy.
c. as long as you downloaded it from the internet.
d. you may not copy software.

5. You may use any image from the Internet or clip art software:
a. if you know that no one will know.
b. if you save it as an “image” and give it a new name.
c. as long as it is confirmed to be “royalty free”.
d. you cannot copy any photograph, artwork, or image without permission.

Answers

Answer:

1. so that it may be archived

2.to pass out to all your students

3.if you relate it to your lessons

4.as long as you've purchased it and you are using it for back up copy

5.C

Which expression is equivalent to 5(s + 6)?

Answers

answer: 5s+30
steps: distribute 5 to s and 6

it would not be surprising for a java function to run faster and faster as it's repeatedly called during program execution. what technology makes this so? question 2 java is

Answers

Java is a compiled language. this means that, before a java program can run, the java compiler must translate the java program into instructions that can be understood by the computer.

What is java?
Sun Microsystems initially introduced Java, a programming language & computing platform, in 1995. It has grown from its modest origins to power a significant portion of the digital world of today by offering the solid foundation upon which numerous services & applications are developed. Java is still used in cutting-edge goods and digital services that are being developed for the future. Although the majority of current Java applications integrate the Java runtime with the application, there are still plenty of programmes and even certain websites that require a desktop Java installation in order to work. This website, Java.com, is made for users who might still need Java for desktop programmes, particularly those that support Java 8.

To learn more about Java
https://brainly.com/question/25458754
#SPJ4

How can I search all columns of a table in SQL Server?

Answers

To search all columns of a table in SQL Server, you can use the LIKE keyword along with the wildcard character %. Here's the syntax:

sql

Copy code

SELECT *

FROM your_table

WHERE column1 LIKE '%search_value%'

  OR column2 LIKE '%search_value%'

  OR column3 LIKE '%search_value%'

  -- add more columns as needed

Replace your_table with the actual name of your table.

Replace column1, column2, column3, etc., with the names of the columns you want to search in.

Replace search_value with the value you want to search for.

The % wildcard character is used to represent any sequence of characters. Placing % before and after the search value ensures that it can match any part of the column value.

The LIKE keyword is used for pattern matching, allowing you to search for values that partially match the specified pattern.

By using the LIKE keyword with wildcard characters %, you can search all columns of a table in SQL Server for a specific value or pattern. This method allows you to perform a broad search across multiple columns, looking for matches in any part of the column values.

To know more about SQL visit

https://brainly.com/question/23475248

#SPJ11

what is the primary function of computer?​

Answers

Answer:

The primary function of a computer is processing the data as per instructions.

Explanation:

S Points
What phrase describes businesses who develop a positive relationship to
society?
A. Eco-corporations
B. Greening the office
c. Social responsibility
O D. Social behavior
SUBMIT

Answers

Answer:

Option(c) i.e "Social responsibility " is the correct answer.

Explanation:

The main objective of the social responsibility organization or the company  that providing the profit to the society in addition to enhancing the value for the shareholders it gives profitability to the business as well as developed the positive relationship between the society in point of the business .

The social accountability giving the highly prevalent environment  for the clients as well as for the stakeholders for there value management also it leading the environmental sustainability.All the other option is not developed the positive relationship to  the society that's why these are incorrect option.

Answer: Social Responsibility

Explanation: APEX

WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME

Answers

Answer:

Best free virus removal and free malware removal tools

Avira Free Antivirus – Offers a larger package of free security tools than most competitors, including real-time AV, malware removal, and a VPN. Bitdefender Antivirus Free Edition: Award-winning free version

Norton is a good one

a web __________ is based on an html source document that is stored as a file on a web server.

Answers

A web page is based on an HTML source document that is stored as a file on a web server.

A web page is a document that is displayed on a web browser when requested by a user. It is created using HTML (Hypertext Markup Language) and can contain text, images, videos, and other multimedia elements. The HTML source code is stored as a file on a web server, which can be accessed by users through the internet.

When a user types a URL or clicks on a hyperlink, the browser sends a request to the web server to retrieve the corresponding web page. The web server then sends the HTML source document to the user's browser, which interprets and displays the content of the page. Web pages can be created using various web development tools and can be designed to meet different purposes, such as sharing information, selling products, or providing online services.

Learn more about web browser here:

https://brainly.com/question/31200188

#SPJ11

what should you do if you want word to apply a coordinated set of styles to ensure there is consistent formatting across the entire document?

Answers

Answer:

I'm pretty sure you can right click on a style and add it to a preset, if that's what you're asking.

Explanation:

Create a template of a change request form. What sections did you include and why?

Answers

According to the information some sections included in the change request form: Request Information,  Description of Change, Impact Analysis, Proposed Solution, Benefits of the Change, Cost Estimate, Approval and Authorization, etc---Cttachments, etc...

What secctions do we include and why?Request Information: This section collects essential details such as the project name, change request number, date, requestor's information, and contact details for easy identification and communication.Description of Change: This section provides a clear and detailed description of the requested change, including the reasons behind it and any relevant background information. Impact Analysis: This section assesses and documents the potential impact of the change on various project aspects, suc´+Proposed Solution: Here, the proposed solution to address the requested change is described, along with any alternative options considered.Benefits of the Change: This section highlights the anticipated benefits or advantages that the change will bring to the project. It helps stakeholders evaluate the value and potential positive outcomes associated with the change.Cost Estimate: This section provides an estimate of the costs associated with implementing the change. It includes financial costs, resource requirements, and any additional expenses. Approval and Authorization: In this section, the approval process for the change request is outlined. It specifies the individuals or roles responsible for reviewing and approving the request. It also provides space for authorized signatures and dates to formalize the approval process.Attachments: This section lists any supporting documents or files that are relevant to the change request. It allows stakeholders to attach additional information, such as diagrams, specifications, or previous discussions, to provide a comprehensive understanding of the change.Review and Evaluation: This section provides space for project stakeholders or change control board members to review and evaluate the change request. Change Request Status: This section helps track the status of the change request, including submission date, review dates, approval status, and implementation status.

Learn more about template in: https://brainly.com/question/13566912
SPJ4

which method is the starting point of all java programs? ​

Answers

Answer:

Java main method is the entry point of any java program. Its syntax is always public static void main(String[] args) . You can only change the name of String array argument, for example you can change args to myStringArgs .

A software program that enables users to create, edit, and format text: presentation spreadsheet word processor database​

Answers

Answer: Word processor

Explanation: Allows you to create and edit formal text. Brand name is probably Microsoft Word or something.

What is the difference between megabytes and gigabytes.

Answers

Answer:

The main distinction between a megabyte and a gigabyte is the number of bytes they contain. A megabyte is made up of 2^20 bytes (1,048,576 bytes), whereas a gigabyte is made up of 2^30 bytes (1,073,741,824 bytes). Taking this into account, a gigabyte can be made up of 2^10 megabytes (1024 megabytes).

Explanation:

Hope this answers your question.

Proper indentation is required in pseudocode.
True
False

Answers

I think it is True but I’m not sure

For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
1) An employee is having trouble opening a file on a computer_______________.
2) The president of a company wants to give the company website a fresh new look.___________
3) An employee wants to work from home but can’t connect to the network from there.___________
4) The vice president of sales would like help designing a new software program to keep track of sales. _______________

Answers

Answer:

An employee is having trouble opening a file on a computer.

→ ✔ information services and support

The president of a company wants to give the company website a fresh new look.

→ ✔ interactive media

An employee wants to work from home but can’t connect to the network from there.

→ ✔ network systems administration

The vice president of sales would like help designing a new software program to keep track of sales.

→ ✔ programming and software development

OAmalOHopeO

An employee is having trouble opening a file on a computer. The employee can use information services and support.The president of a company wants to give the company website a fresh new look. He can use interactive media.An employee wants to work from home but can’t connect to the network from there - network systems administration.The vice president of sales would like help designing a new software program to keep track of sales - programming and software development.What is a computer?

Computer, refers to the device originally meant for the calculations but currently used for doing several other functions such as weather forecasting, communications, storing the data etc. It is a processing device that stores the information, process the information and gives the output to the users.

A worker is having problems using a computer to open a file. The employee has access to support and information services. The firm president wants to give the website a brand-new makeover. He's got access to interactive media.

Network systems administration: An employee wants to work from home but is unable to do so. The vice president of sales is looking for assistance with programming and software development to create a new software program to track sales.

Learn more about Computer here:

https://brainly.com/question/21080395

#SPJ2

Focusing on the career cluster "Arts, Audio/Video Technology & Communications", which of the following careers is NOT part of this cluster? (Choose all that apply.)

Landscaper
News Reporter
CEO
Actress
Graphic Design Artist
I will give brainliest to right answer

Answers

Answer:

Landscaper

CEO

Explanation:

Arts, Audio/Video Technology & Communications:

Careers including performing arts, acting, dance, visual arts such as animation and graphic design. Includes audio and video careers, such as news reporters, television technicians, and film editors.

Other Questions
Did the Treaty contribute to World War II? Or is it entirely blameless? solve the following system of linear equations by substitution and determine whether the system has one solution, no solution, or an infinite number of solutions. if the system has one solution, find the solution. -3x+ y=20, x+y=-4 Ned want to enter the home of a suspect to search for evidence but does not have a warrant he see someone shredding papers through the window. Which of the following expectations allow him to enter the home?probable cause arrest O exigent circumstances USA patriot act private markets are those like the nyse, where transactions are handled by members of the organization, while public markets are those like the nasdaq, where anyone can make transactions. group of answer choices true false angle bisector theorem Find the power of A for the matrix A = [1 0 0 0 0 0 1 0 0 0 0 0 -1 0 0 0 0 0 1 0 0 0 0 0 -1]. A^16 = [1 0 0 0 0 0 1 0 0 0 0 0 -1 0 0 0 0 0 1 0 0 0 0 0 -1] A constitution tells how a nations government is organized and run. *TrueFalse which of the epithelial cell membrane specializations bend in response to pressure waves? How does mary olivers deciption of the sun differ from joann aikens depiction of the sun? How is it similar? fred went to pick oranges at a cutrus farm.He picked 5 bushels of oranges and paid $31.75. How much would it cost to pick 7 bushels of oranges?Helpp ACME incorporated can purchase component Q from 3 potential suppliers. Supplier A charges a fee of $6.50 per component. Supplier B charges $1700 per order plus $2.00 per component ordered. Supplier C charges $3.00 per component, and requires the buyer to pay for at least 450 components (even if the order size is less than 450). 4. What is the full range of order sizes where each supplier is optimal? 5. ACME decided to buy 500 units of component Q from supplier A. How much money could the company have saved if it purchased the 500 units from supplier B instead of supplier A? 6. Next week supplier B will be running a 15% off special. What equation represents the new Total Cost for supplier B during the sale? Which item below indicates a direct quote that is introduced?A. Meyer (2009) believes that children can learn about the terribleeffect of using drugs from mothers, fathers, and educators (p. 115).B. Tanya Sommerfield (2010) states, "Adopting a positive habit likeexercise can be as tough as breaking a bad one like smoking" (as citedin Krocoff, 2009, p. 25).C. "Our DNA has changed by only 2%" (Isaac, 2008, p. 43) issignificant. By which number -725 should be divided to get -115 A two-bladed wind turbine is designed using one of the LS-1 family of airfoils. The 13 m long blades for the turbine have the specifications shown in Table B.4. Assume that the airfoil's aerodynamic characteristics can be approximated as follows (note, a is in degrees):For 21: C = 0.95 Ca = 0.011954+0.00019972 +0.00010332 For the midpoint of section 6 (r/R=0.55) find the following for operation at a tip speed ratio of 8: All of the following are part of the RICE formula for treating sports- and fitness-related injuries EXCEPTA. rest the injured body part.B. elevate the injured extremity.C. compress the injury with an elastic bandage.D. apply heat at the injury site. the body of water located at number 3 is the and the body of water at number 7 is 5. If p-p-16 then 3p-7= aera of circle if the raidius at the gragh is (3,4) Over the course of the hole trip, we drove the length of the Blue Ridge Parkway through Virginia and North Carolina, stopping at lakes and scenic trails along the way. the network devices that deliver packets through the internet by using the ip information are called: a) Switch b) Firewallc) Hubsd) Routers