1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
2 years ago
9

In what order will the transmission control protocol (tcp) generally send all segments

Computers and Technology
1 answer:
IgorC [24]2 years ago
4 0

The order that the transmission control protocol (tcp) generally send all segments is a sequential order.

<h3>What is a transmission control protocol?</h3>

It should be noted that the transmission contol protocol simply means a communication standard that enables application programs to exchange messages over a network

In this case, the order that the transmission control protocol (tcp) generally send all segments is a sequential order.

Learn more about transmission contol protocol on:

brainly.com/question/14219758

#SPJ12

You might be interested in
Which of the following will you do in step X in the following series of clicks to change the bounds of
ser-zykov [4K]

In order to change the bounds of  a chart axis after performing the aforementioned series of clicks, at step X: C. Type the number that you want in the text box.

A step chart can be defined as a line chart that uses both the vertical and horizontal lines to connect two (2) data points. Thus, it enables an end user to see the exact point on the X-axis when there is a change in the Y-axis.

In Microsoft Excel, the series of clicks that are used to change the bounds of  a chart axis are:

  • Click on chart.
  • Select chart tools and then format tab.
  • Select the current selection and then format selection.
  • Click on format axis and then axis options.
  • Click on vertical axis crosses.
  • At category number, you should type the number that you want in the text box.

In conclusion, typing the number that you want in the text box is the action that should be performed at step X.

Read more on step chart here: brainly.com/question/9737411

3 0
3 years ago
List the four types of computer cases
nignag [31]

Answer:

full-tower, mid-tower, mini-tower, and SFF(Small Factor Form).

I hope it helps.

3 0
3 years ago
Read 2 more answers
Who presented pakistan resolution​
beks73 [17]
Search Results
Featured snippet from the web
Fazlul Huq, the Prime Minister of Bengal, was a formal political statement adopted by the All-India Muslim League on the occasion of its three-day general session in Lahore on 22–24 March 1940.

I got it from google!
3 0
4 years ago
How does it transform your ways of socializing
frez [133]

How to transform your ways of socializing:

Know Yourself. The first and foremost reason why many people fail in effective socializing is the fact that they don’t know themselves well.

Be yourself. Another reason of failing to socialize or failing to make that “first impression” is that we try to mimic others.

Body Language. The way you walk, stand, talk, eat and sit… Each and every gesture and posture of yours speaks volumes about you.

Your attire. I had a client who had severe social anxiety. It was aggravated when her mother forced her to wear stuff that was too body revealing.

etc.

This was written from a biography about someones experience.

_____________________________

<em>Brainliest </em>would be greatly appreciated.

I found this!

______________________________

<em><u>#SpreadTheLove</u></em>

<em><u>#SaveTheTrees</u></em>

4 0
3 years ago
Find all the files and directories in /var (including subdirectories) that are owned by user root. Send the list of full path na
Dennis_Churaev [7]

Answer:

find /var -user root > s8

Explanation:

To look for a file matching multiple conditions with find, what you do is to simply list each condition in turn. For instance, to look for a file owned by root (-user root) and writable by its owner (-perm -u+w) on the root filesystem (-xdev, meaning not to recurse underneath mount points such as /proc and /sys) and called hello:

find / -xdev -user root -perm -u+w -name hello

If you're looking for world-writable files, replace -u+w by -a+w. (The - before the permissions means that the file must have at least these permissions; without it find would search for a file that has exactly the distinct permissions.) With GNU find, you can also look for a file that is writable by the user running find: replace -perm -u+w by -writable.

In this case, frame the command as required.

Code: find

Everywhere

code: /

Only directories

code: var

Root owned file

code: - user root

Permission bits

Code: > s8

7 0
3 years ago
Other questions:
  • A simple way to think of the Excel application is as a giant ______.
    5·2 answers
  • Why is it important to open the Map Custom Fields dialog box before importing/exporting a list of contacts? Check all that apply
    6·2 answers
  • Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write yo
    9·1 answer
  • The fastest way to get help is to type a word or two in the search box.
    7·1 answer
  • Open IDLE. Create a new script file (File--&gt;New File, Ctrl n on Windows, Cmd n on macOS). On the first line, place your name
    6·1 answer
  • The type of e-cards that have an antenna built into them are __________ cards.
    10·2 answers
  • What does digital mean, in the term of computer science.
    11·1 answer
  • OTATAYAYYAYYA HAVE A NICE DAY BEAUTIFUL PEOEOEPOPEPELELELEEL
    5·2 answers
  • WILL GIVE BRAINLEIST PLZ HELP PLZ AND THANK YOU
    7·1 answer
  • Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after t
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!