Answer:
Yes, both of these segments (A and B) will be directed to the same socket at Host C .
Explanation:
Suppose both Host A and Host B each send a UDP segment to Host C with destination port number 6789, surely , both of these segments will be directed to the same socket at Host C .
Reason being that, the operating system will provide the process with the IP details to distinguish between the individual segments arriving at host C- for each of the segments (A and B) recieved at Host C.
Answer:
ROM stands for read-only memory. It's used to store the start-up instructions for a computer, also known as the firmware. Most modern computers use flash-based ROM. It is part of the BIOS chip, which is located on the motherboard.
Answer:
Possible if hackers are not so intelligent.
Explanation:
Actually, hackers are intelligent
where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.
Normally hackers will generate different location places and by using decipher it is possible to find the location codes.
Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.
It is possible to by using decipher to get uncovered locations
I have a feeling you're looking for Microsoft Outlook.