How do cryptography-based keys ensure the validity of data
transferred across the network?
Answer Posted / deniaxis
Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
| Is This Answer Correct ? | 7 Yes | 0 No |
Post New Answer View All Answers
Why Use VSATs?
Differentiate between stop-and wait ARQ and Go-back-N protocol.
I need to know the driver name associated with the DSN ? In java we can get it by using getDriverName()(implemented by 3rd party vendors.) method ? but i need the implemetation to get the driver name? so can u give me the code ? how to get the code ?
how do u share printer through FTP(fire transfer protocol)?
What is virtual channel
Explain Token ring
Discuss the following terms with respect to ATM: VPI, UNI, asynchronous, AAL, Cell, PVC.
What is MAC address
Define Satellite Networks
what is the command to check how many port numbers are running with their specific protocols in linux pc
Dear Sir, I have installed 40 HCL thin clients model BVX 4000 on windows 2003 server in the RDP mode, Processor is xeon 3040 1.667 GHZ, with 320 GB SATA Hard Disc and and 1 GB RAM ECC DDR II RAM , in have also expanded the RAM to 8 GB. but still the Graphics and ppt are opening in frames. please do suggest me how can i use these thin Clients to work in the normal pc mode so that the graphics( Photos .JPEG images and normal power point presentations.? Regards ather.
What is region
Explain leaky bucket algorithm and compare it with token bucket algorithm.
What is the difference between TFTP and FTP application layer protocols?
What is virtual path