Answer: An undirected graph is the graph that has the connection of the objects in the form of bidirectional edges.This graph is formed for by the attachment of the collection of the objects which get displayed in the form of network and thus, also known as the undirected graph.
The graph is formed by the nodes or objects getting connected and form edges or link(which is typically in the form of line).
.
Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires is True.
True
<u>Explanation:</u>
In network packet loss is considered as connectivity loss. In this scenario host A send two segment to host B and acknowledgement from host B Is awaiting at host A.
Since first acknowledgement is lost it is marked as packet lost. Since in network packet waiting for acknowledgement is keep continues process and waiting or trying to accept acknowledgement for certain period of time, once period limits cross then it is declared as packet loss.
Meanwhile second comes acknowledged is success. For end user assumes second segments comes first before first segment. But any how first segment expires.
Answer: C)LACP
Explanation: LACP(Link Aggregation Control Protocol) is the protocol that is responsible for the management of the physical ports present on a particular channel. The main purpose of this protocol is to improve performance by laying the network in the parallel structure so that traffic can be managed.
Other option are incorrect because they don't provide traffic management over the physical link. Thus, the correct option is option(C).
Answer & Explanation:
A local tax is usually collected in the form of property taxes and is used to fund a wide range of civic services from garbage collection to sewer maintenance. The amount of local taxes may vary widely from one jurisdiction to the next. Local tax is also referred to as a municipal tax.
Answer:
People
Explanation:
Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.