answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
2 years ago
11

What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo

rk
Computers and Technology
1 answer:
pickupchik [31]2 years ago
6 0

Answer:

"message encoding, message size and message delivery" are the correct answer for the above question.

Explanation:

The above defined are the three requirements which are defined as the protocol used in communication. These three requirements are a very essential part of communication because-

  1. Message Encoding is the first requirement, which is used to encode the message so that the hacker can not hack the communication data from the network.
  2. The second requirement is Message size which fixed the size and the number of packets used to send for the communication.
  3. The third requirements are Message delivery, for which the protocol needs to define the mechanism to overcome the loss of the data.

You might be interested in
__________ is the current federal information processing the standard that specifies a cryptographic algorithm used within the U
Free_Kalibri [48]

Answer:

FIPS 140-2 es el acrónimo de Federal Information Processing Standard (estándares federales de procesamiento de la información), publicación 140-2, es un estándar de seguridad de ordenadores del gobierno de los Estados Unidos para la acreditación de módulos criptográficos. ... El Instituto Nacional de Estándares y Tecnología (NIST)

Explanation:

8 0
2 years ago
Find true or false. A hacker is hacking software with access in sensitive information from your computer​
Alina [70]
ITS TRUE!!I SEARCHED IT
7 0
1 year ago
Most ________ are accompanied by several common utility programs, including a search program, a storage management program, and
diamong [38]

Answer:

operating systems

Explanation:

The operating systems is shortly known as OS. It is a system software which manages the software resources of the computer, computer hardware and also provides some common services for the various computer programs.

Most of the operating systems available in the market provides some common utility programs such as the search program, a backup program and a storage management program also.

Some common operating systems are : Linux, Microsoft Windows, Ubuntu, macOS, Unix, and many more.

4 0
2 years ago
What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi?
elixir [45]

Answer:

Explanation:

.exe: is a file extension, means file that contain executable program which can be run by Microsoft windows.

.txt: is also file extension which contains text (characters).

.avi: means (audio video interleave) is a file extension, which contains audio and video data encoded.

3 0
2 years ago
Jim has excellent oral and written communication skills. He enjoys public speaking and wants a job in which he will interact wit
lianna [129]
The best job for Jim would be public relations specialist.
7 0
2 years ago
Read 2 more answers
Other questions:
  • True or false? The largest component of a database is a field.
    12·2 answers
  • Richard uses Microsoft outlook as his email client. He wants to check whether he has received any new mail. Identify which key R
    12·1 answer
  • Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages
    11·1 answer
  • Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order), how would the first-fit, best-fit,
    11·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • Write the definition of a function power_to, which receives two parameters. The first is a float and the second is an integer. T
    5·1 answer
  • You are using a polynomial time 2-approximation algorithm to find a tour t for the metric traveling salesman problem. Which of t
    7·1 answer
  • Assume that the following method header is for a method in class A. public void displayValue(int value) Assume that the followin
    11·1 answer
  • Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
    8·1 answer
  • Which of the following statements best describes the relative amount of content held by digital libraries vs. the amount held by
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!