How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
|Is This Answer Correct ?||4 Yes||0 No|
Why is a data link layer switch preferred over a hub ?
TCP/IP can work on a)ethernet b)tokenring c)a&b d)none
What is Device Manager?
Why TCP and IP are written all together as TCP/IP?
i want to known about the ubuntu enumerate the various costs associated with the performance, security, support, and maintenance Thanks. please reply the firstname.lastname@example.org
What is Norton Ghost? How do i create a bootable disc?
Hi Can anybody tell me how I can get CCNA certificate for beginners
An alternative to LAN is simply a big timesharing system with terminals for all users. Give two advantages of a client-server system using a LAN.
Which layer is used to detect and correct errors
What is your most recent experience with VERTAS backup software?
how can use the process id in ospf?
Which is the protocol used in ethernet. (CSMA/CD) Why is it called so ?