How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
|Is This Answer Correct ?||4 Yes||0 No|
what is web server,application server,database server
FEW PORTS GET BLOCKED IN CISCO SWITCHES, CAN ANYONE TELL HOW TO UNBLOCK THIS PORTS
What is a NIC?
Could u Pl. explain all the 7 layers of network?
How to make a port to a dedicated port through dll registration in a windows system
What do you mean by link to link layers of OSI reference model? Explain their functions briefly?
what is basic of networkin ?2.what is main topik of networkin ? 3.how installed the software and drivers ? 4. how to connect the pc and net?5.what uses of protocol in networking,and tell main proto of netwo
Am planning to do a course on Remote Infrastructure Management.Is it a good field. And one more thing. Am planning to join Talent Sprint, Hyd. How good is this institute. Please help fast
how can give permission with acl in numeric mode not in aplhabetical mode
TCP/IP MODEL AND ITS RELATIVE DIFF WT OSI MODEL??????????