How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
| Is This Answer Correct ? | 7 Yes | 0 No |
Any body tell me my system is restarting. i hav add new RAM 256 MB.plz tell me how can i handle it.
WHICH OF THE FOLLOWIGN IS NOT AN IMPACT DEVICE.
TCP/IP can work on a)ethernet b)tokenring c)a&b d)none
What is Administrator?
What is Safe Mode?
Assuming classful addressing, find the no of subnets and the no of hosts per subnet for the following blocks: (i) 122.45.77.32/20 (ii) A class B block having mask of 255.255.192.0
1).what is forest? 2).what is dns and dhcp port no's? 3).what is file system? 4).what is terminal server?
where can we see the OS in the system?
Different Solutions to dining philosophers problem.
Why is a data link layer switch preferred over a hub ?
Who developed the UNISHA. and why they cannot continued this software?
what is Brouter?
3 Answers Elgi Equipments, Wipro,