answersLogoWhite

0

A computer in a given network is communicating with a specific group of computers. What type of communication is this?

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

How does https become a secure protocol?

https does not 'become' a secure protocol, it 'is' a secure protocol. however, it is 'common practice to intially use the http protocol and 'switch to' or 'use' the https protocol for 'secure' or 'encrypted' communication. information exchanged using the http protocol is exchanged in the 'clear' or using 'plain' text while information exchanged using the https protocol is 'encrypted' (using any number of encryption and or signing mechanisms)prior to exchange. https is an industry agreed upon standard that references the 'secure exchange' of http information.


What is the chief advantage of using protocol ports instead of process identifiers to specify the destination within a machine?

CIS 331?


What is nursing audit?

Evaluation of nursing procedures using standard checklist that have been created for the purpose of compliance to standard protocol and improving quality of care.


Is there a standard for the Newton?

No, there is no standard Newton in a cabinet somewhere. The Newton is defined using the standards for the meter, kilogram and second.


What is meant by protocol in relation to computer networks?

A protocol is a set of rules for communication.A protocol is a set of rules for communication.A protocol is a set of rules for communication.A protocol is a set of rules for communication.


What is the ieee standard for the wifi protected access 2 security protocol?

The IEEE standard for Wi-Fi Protected Access 2 (WPA2) is defined by IEEE 802.11i. This security protocol enhances wireless network security by implementing advanced encryption methods, primarily using the Advanced Encryption Standard (AES) for data protection. WPA2 also introduces the use of a robust key management system, ensuring secure authentication of users on the network. It is widely used to protect personal and enterprise wireless networks.


What ports does Windows Server 2008 use for FTP?

If using standard FTP protocol then ports 20 and 21 would be used.


Types technology using determnistic MAC protocol and Non Deterministic MAC protocol?

types technology using determnistic MAC protocol and Non Deterministic MAC protocol?


What is the advantages of using non standard units?

Any advantage, only confusions and errors.The SI is strongly recommended.


Why is using the metric system superior to using the standard system of measurement?

It's not "superior" ... but it is the agreed on system for almost all the world - thus it's advantage is consistency.


What is the advantage of using PLM?

What is the advantage of using an PLM


What are examples of a file transfer protocol?

The File Transfer Protocol is a standard network protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server