1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
1 year ago
10

Examine the following output:

Computers and Technology
1 answer:
bixtya [17]1 year ago
8 0

The report shows that SERVER1 has six active TCP connections. The first two are in the state TIME WAIT, the third is in the state CLOSE WAIT, and the final three are in the state ESTABLISHED.

TCP: What is it?

One of the key protocols in the Transmission control protocol / internet family is the Transmission Control Protocol. (TCP). It was first used to supplement the Internet Protocol in network protocol deployments (IP). TCP/IP is the name given to the full suite as a result. Software running on hosts communicating via an IP network can transmit a stream of octets (bytes) in a reliable, orderly, and error-checked manner using TCP. TCP is a key component of popular internet services like the World Wide Web mail, remote management, and file transfer.

To know more about TCP
brainly.com/question/28119964
#SPJ4

You might be interested in
There are about what licensed drivers here in Florida
arsen [322]
 There are about 15,000,006
6 0
3 years ago
________ is the application of statistical techniques to find patterns and relationships among data for classification and predi
Finger [1]

Answer:          

Data Mining

Explanation:

  • Data Mining is also called knowledge discovery.
  • It is a computer aided technique of searching and evaluating a bulk of data in order to obtain useful information.
  • This technique searches through the data to find hidden patterns and uses statistical methods to find relationship among data for finding predictive information and for classification of data.
  • This is a mixture of different disciplines which include machine learning, statistics and artificial intelligence and also some mathematical methods.
  • Often the useful information is extracted from enormous database using modeling technique which is used to build a model from instances of the data where the solution is known and later apply this model on the instances where the solution is unknown.
  • In unsupervised data mining, the data analysis is not done by using modeling technique. In other words the labels are provided in order not draw inferences and prediction from data sets. Example is clustering.
  • In supervised data mining the model is developed to make inferences and classification. Example is neural networks.
  • For example data mining is used in Medicine industry to provide more accurate diagnostics and treatments on the basis of patient's medical history , physical examination or different patient tests data.
  • Data mining also makes it possible to manage health resources more efficiently and cost-effectively by detecting risks, predicting diseases in certain sections of the population or predicting hospitalization duration.
4 0
3 years ago
BOTH QUESTIONS ONLY FILL IN C++ CODEWrite a copy constructor for CarCounter that assigns origCarCounter.carCount to the construc
Alborosie

Answer:

im lost tell me a question then ill answer

Explanation:

4 0
3 years ago
Jenny wants to create an animated short video to add to her website. Which software will she use to create this animated video?
denis23 [38]
Adobe Spark or Adobe Premier.
6 0
3 years ago
One vital component of your professional behavior with regard to computing systems today is the creation of​ _________.
zlopas [31]
<span>One vital component of your professional behavior with regard to computing systems today is the creation of​ strong passwords.
It is very important to have a good password on your computer, especially if you are dealing with sensitive data and information. It would be for the best to create such a password which won't be hacked into easily, in case somebody wants to steal your data.
</span>
3 0
2 years ago
Other questions:
  • How to write a program converting RGB to CMYK in python
    6·1 answer
  • .exe, .msi, .msp, .inf - together, what do these filetypes indicate
    12·2 answers
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • If you are viewing a webpage with customized or regenerated content, such as updated stock quotes, what type of webpage are you
    14·1 answer
  • Need 2.5 Code Practice Answers
    14·2 answers
  • What are the TWO methods of copying and pasting on the AutoCAD Clipboard function?
    7·1 answer
  • The design of a blog refers to:
    10·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    14·1 answer
  • Circuit pruning occurs only before puberty.<br> O True<br> O False
    9·2 answers
  • Do you have any sprites for Friday Night Funkin?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!