1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
3 years ago
11

​________ establishes a connection between the​ computers, sequences the transfer of​ packets, and acknowledges the packets sent

.
Computers and Technology
1 answer:
Shalnov [3]3 years ago
6 0

Answer:

TCP(Transmission Control Protocol)   .

Explanation:

Transmission Control Protocol Is the protocol which maintains and making set up the connection in the network. The Transmission Control Protocol is doing her duties with the help of internet protocol, The main function of internet protocol that it defines the rules how the data is sent between each other in the form packets in the computer.

The  function of Transmission Control Protocol is given as

  • Establishes the connection between​ computers.
  • Transfer of data in the form of packets.
  • Acknowledge the sender  and receiver that packet is sent  
You might be interested in
Language: C
Vikentia [17]

The .cpp code is avaiable bellow

Code:

#include <stdio.h>

#include <string.h>

int main()

{

    char **kW;

    char *fN;

    int nW = 0;

    kW = malloc(5000 * sizeof(char*));

    for (int i = 0; i<5000; i++)

    {

         kW[i] = (char *)malloc(15);

    }

    fN = (char*)malloc(25);

    int choice;

    while (1)

    {

         printf("1) File text to use as cipher\n");

         printf("2) Make a cipher with the input text file and save result as output file\n");

         printf("3) Decode existing cipher\n");

         printf("4) Exit.\n");

         printf("Enter choice: ");

         scanf("%d", &choice);

         if (choice == 1)

         {

             nW = readFile(kW, fN);

         }

         else if (choice == 2)

         {

             encode(kW, fN, nW);

         }

         else

         {

             Exit();

         }

         printf("\n");

    }

    return 0;

}

int readFile(char** words, char *fN)

{

    FILE *read;

    printf("Enter the name of a cipher text file:");

    scanf("%s", fN);

    read = fopen(fN, "r");

    if (read == NULL)

    {

         puts("Error: Couldn't open file");

         fN = NULL;

         return;

    }

    char line[1000];

    int word = 0;

    while (fgets(line, sizeof line, read) != NULL)

    {

         int i = 0;

         int j = 0;

         while (line[i] != '\0')

         {

             if (line[i] != ' ')

             {

                  if (line[i] >= 65 && line[i] <= 90)

                  {

                       words[word][j] = line[i]; +32;

                  }

                  else

                  {

                       words[word][j] = line[i];

                  }

                  j++;

             }

             else

             {

                  words[word][j] = '\n';

                  j = 0;

                  word++;

             }

             i++;

         }

         words[word][j] = '\n';

         word++;

    }

    return word;

}

void encode(char** words, char *fN, int nwords)

{

    char line[50];

    char result[100];

    if (strcmp(fN, "") == 0)

    {

         nwords = readFile(words, fN);

    }

    getchar();

    printf("Enter a secret message(and press enter): ");

    gets(line);    

    int i = 0, j = 0;

    int w = 0, k = 0;

    while (line[i] != '\0')

    {        

         if (line[i] >= 65 && line[i] <= 90)

         {

             line[i] = line[i] + 32;

         }

         w = 0;

         int found = 0;

         while (w<nwords)

         {

             j = 0;

             while (words[w][j] != '\0')

             {

                  if (line[i] == words[w][j])

                  {

                       printf("%c -> %d,%d \n", line[i], w, j);

                       found = 1;

                       break;

                  }

                  j++;

             }

             if (found == 1)

                  break;

             w++;

         }

         i++;

    }

    result[k] = '\n';

}

void Exit()

{

    exit(0);

}

3 0
3 years ago
Which device hold data and instructions when it is not in use?
Lilit [14]
Secondary Storage.
I hope this helps! XD
4 0
4 years ago
What are examples of environmental technology
Dafna1 [17]
Wave energy, wind power, solar panels,  Ocean thermal energy conversion, and carbon dioxide. 
8 0
3 years ago
Match each item with a statement below.
Fed [463]

Question: each item with a statement below.

Answer: g. hardware

3 0
3 years ago
Troubleshooting differs from diagnosis in that _____.
hodyreva [135]
Diagnosis results from troubleshooting (figuring out what went wrong). Fixing occurs after you diagnose what went wrong, which is arrived at by troubleshooting.
5 0
4 years ago
Other questions:
  • Henry uploaded the photos of his birthday to a cloud storage system. He feels that it’s a safe option for data storage. His frie
    12·1 answer
  • 15)Which of the following statements is generally true about a V8 engine...
    10·1 answer
  • Select the correct answer.
    13·1 answer
  • Which of the following accurately describes one way that individual goods
    11·1 answer
  • 10. Differentiate between equity share &amp; preference share.​
    11·1 answer
  • According to the narrator of "EPIC 2015, in 2015, "news" is:
    11·2 answers
  • URGENT HELPP<br> WILL MARK BRAINLIST
    6·1 answer
  • Please help me please it's urgent​
    6·1 answer
  • Which html tag designates links to other web pages?.
    15·1 answer
  • Jhon bought a new printer for his desktop computer. It does not work even though he checked all the cables and cords. What do yo
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!