How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
| Is This Answer Correct ? | 7 Yes | 0 No |
I have 2 networks. One is LAN & other is Tata Indicom Modem which is connected to USB. The problem is that When USB Modem is using, i am unable to use LAN. And when we use LAN, we cannot use USB Modem. kindly help me.
Why the data input flectuation occurs when you are online?
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
Different Solutions to dining philosophers problem.
Which of the following is not property of dbms.
Give two reasons why PGP compresses messages.
Can you name all the physical layers in networking?
give an example of bus type network.
what is DHCP in networking clear it properly pls
When creating a static route, what is the gateway used to define?
What are the two reasons for using layered protocols?
What is BIOS (Basic Input Output System)