1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
6

The tcp/ip ____ layer commonly uses the transmission control protocol (tcp) to maintain an error-free end-to-end connection.

Computers and Technology
1 answer:
aleksklad [387]3 years ago
6 0
The answer would be the TCP/IP Application Layer.
You might be interested in
Please help me with this! I’m using Python 3
IgorLugansk [536]

Something like this?

h1 = int(input())

m1 = int(input())

s1 = int(input())

h2 = int(input())

m2 = int(input())

s2 = int(input())

s = h2*3600 + m2*60 + s2 - (h1*3600 + m1*60 + s1)

print(s)

3 0
3 years ago
An AM index between 0 and 1 indicates what? a. the AM signal is very small and will not be detected by the receiver b. distortio
Leto [7]

Answer:

Option c.

Explanation:

AM refers to the amplitude modulation.

AM refers to the modulation of a wave used as a means of broadcasting an audio signal by combining it with a radio carrier wave and varying its amplitude

An increase in message amplitude, Am, results in a higher AM Index.

An AM index between 0 and 1 indicates the received modulated signal will have minimal distortion.

So, option c. is correct.

7 0
3 years ago
Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
cupoosta [38]

Answer:

Following are the program in java language:

import java.util.*; // import package

public class Main

{

public static void main(String[] args) // main method

{

 int num; // integer variable declaration

 double r; //double varaible declaration

 char ch; // char variable declaration

Scanner scnr=new Scanner(System.in); // creating the instance of scanner

 System.out.println("Enter the string:");

 String str=scnr.nextLine(); // reda string by user

System.out.println("Enter the integer value:");

 num=scnr.nextInt(); // Read integer value by the user

 System.out.println("Enter the Double value:");

 r=scnr.nextDouble(); // read double value by user

 System.out.println("Enter the character value:");

 ch= scnr.next().charAt(0); // read character by user

 System.out.print(num + " ,"); // display them in a single line

 System.out.print( " " +r +" ,");//dislpay in a single line  

  System.out.print( " " +ch +",");//dislpay in a single line

 System.out.print(" " +str);//dislpay in a single line

}

}

Output:

Enter the string:

ram

Enter the integer value:

34

Enter the Double value:

45.789

Enter the character value:

r

34 , 45.789 , r, ram

Explanation:

Following are the description of program

  • Read the integer ,string,char,double value by the user by using scanner class in "num","str","ch" and "r" variable respectively
  • Print that value in a single line separated by comma by System.out.println statement.

7 0
3 years ago
Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security
cupoosta [38]

Answer:

confidentiality

Explanation:

Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of

3 0
3 years ago
Clicking a _____ name opens a drop-down list of commands and options.
UkoKoshka [18]
Clicking a menu opens a drop-down list of commands and options. According to Merriam dictionary, menu is defined as a list of things that you can choose from ; especially computers or a list shown on a computer from which you make choices to control what the computer does.
6 0
3 years ago
Other questions:
  • What is the difference between deta security and privecy ?
    12·2 answers
  • The right of workers to seek safety and health on the job without fear of punishment is spelled out in:
    8·1 answer
  • If a client is found _________ the NAP will attempt to make it _______. Group of answer choices A. non-compliant, compliant B. s
    13·2 answers
  • Read each statement below. If the statement describes a peer-to-peer network, put a P next to it. If the statement describes a s
    12·1 answer
  • Crees que es necesario que el estado Peruano, proponga nuevamente el aislamiento desde este 22 de diciembre al 02 de enero del 2
    6·1 answer
  • Rules used in naming variables in object oriented programming​
    12·1 answer
  • Ideally, Internet of Things (IoT) devices have the ability to:
    14·1 answer
  • Information that's been collected to help solve a problem is called
    10·1 answer
  • Once you fix the bug in a code, what is the last thing you should do?
    6·1 answer
  • Write a function named “createPurchaseOrder” that accepts the quantity (integer), the cost per item(double), and the description
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!