How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
| Is This Answer Correct ? | 7 Yes | 0 No |
how do u share printer through FTP(fire transfer protocol)?
FILESYSTEM scenario. A volume is filling up and almost out of space. How do you determine what is using up your available filesystem space?
waht is DHCP?
One of my friend told that M.C.A people are not prefered by the companies for networking side requirement is it true? please post your answer.because i want to make my career at networking side.
what are the work of 7 layers in osi model?
Write two ways in which computer applications differ from network applications ?
What is region
What are the basic functions of the data link layer?
what are the various network topologies ?
What EMC hardware have you worked on? (like DMX3/4 etc) --SAN
Differentiate between ISO-OSI and TCP/IP reference model.
what is vpn and describe the diffrence between ras and vpn