How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
Is This Answer Correct ? | 7 Yes | 0 No |
Dear Sir, I have installed 40 HCL thin clients model BVX 4000 on windows 2003 server in the RDP mode, Processor is xeon 3040 1.667 GHZ, with 320 GB SATA Hard Disc and and 1 GB RAM ECC DDR II RAM , in have also expanded the RAM to 8 GB. but still the Graphics and ppt are opening in frames. please do suggest me how can i use these thin Clients to work in the normal pc mode so that the graphics( Photos .JPEG images and normal power point presentations.? Regards ather.
how to take backup of BIOS ?
What is the Cable called for connecting Hard Disk to MotherBoard ?
How to use a user of domain as a SQL server database login.
NFS server + Solaris client + Linux client, all connected at GigE to the same switch. The Linux client is fast but the Solaris client is slow. Explain troubleshooting steps
what is piggy backing?
How do cryptography-based keys ensure the validity of data transferred across the network?
What is the advantage of Ring network ?
What are class A, B,C,...
12 Answers Bank Of America, Banyan Soft,
How Gateway is different from Routers?
What is Active Directory?
Which one is not done by Data link layer ? 1. bit stuffing 2. LRC 3. CRC 4. parity check