1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
2 years ago
8

what field in the ipv4 datagram header can be used to ensure that a packet is forwarded through no more than N headers

Computers and Technology
1 answer:
andrew-mc [135]2 years ago
5 0

Answer:

Time to Live (or TTL)

Explanation:

This counter field is initially set at some value that is decremented by one each time the packet "hops." When the counter reaches zero the packet is disposed of.

You might be interested in
When virtualization is used and bare-metal solutions are implemented, what is the item that resides between the virtual machines
Yakvenalex [24]

That's the hypervisor.

6 0
3 years ago
Read 2 more answers
3) According to the five-component model of information systems, the ________ component functions as instructions for the people
Ludmilka [50]

Answer:HUMAN RESOURCES AND PROCEDURE COMPONENTS

Explanation: Information systems are known to contain five components, these components help to describe the various aspects and importance of Information systems.

They Include The DATABASE AND DATA WAREHOUSE components(act as the store for all data), The COMPUTER HARDWARE(the physical components of the information systems such as computer harddrive etc)

THE COMPUTER SOFTWARE( the software which includes all the non physical and intangible assets of the information system),

THE HUMAN RESOURCES AND PROCEDURES COMPONENT( which gives instructions to the users).

THE TELECOMMUNICATIONS.

7 0
3 years ago
Which one can be used as watermark in a word document?​
otez555 [7]

Answer:

On the Design tab, select Watermark.

In the Insert Watermark dialog, select Text and either type your own watermark text or select one, like DRAFT, from the list. Then, customize the watermark by setting the font, layout, size, colors, and orientation. ...

Select OK.

4 0
3 years ago
True or False<br> humans shed skin in their sleep (pwease fweinds onwy answer)
eimsori [14]

Answer:

Not all people but sometimes it happens

4 0
3 years ago
Which is a method used to determine database requirement?
Ivahew [28]

Answer:

I think it would be A, good luck!

8 0
3 years ago
Other questions:
  • Brian wants to conduct an online search using a certain phrase he intends to use the word books that belong to the 1800's in his
    8·1 answer
  • How many bits are required to address a 1mx8 main memory if main memory is byte addressable?
    6·1 answer
  • A(n) ____ path is a path used for external links that includes the complete address for the destination page, including the prot
    12·1 answer
  • Which of the following can a cell contain?
    9·2 answers
  • What direction would a sprite go if you constantly increased its x property? Your answer What direction would a sprite go if you
    7·1 answer
  • You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP
    9·1 answer
  • If String str = "Computer Science";, then what is the value of str.substring(10);? ​
    6·1 answer
  • In numpy to append two arreys vertically the function __ is used
    12·2 answers
  • What are the parts of a file?​
    9·1 answer
  • When dividing it’s total debt by total equity what’s a company trying to measure
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!