1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
7

A dropped packet is often referred to as a _____________.

Computers and Technology
1 answer:
rjkz [21]3 years ago
3 0
The answer to this question is the "connection oriented sessions", this is also referred to us as dropped packet where the packet contains a lot of information. When packet sent, we need to check for delivery and when the packet is being dropped we need to resend it and repeat the procedure.
You might be interested in
What would 128 kbps look like on a phone? i.e. 4g, 3g, 2g, etc
vovangra [49]
5g I think.............
8 0
3 years ago
Why is UDP less reliable than TCP?
borishaifa [10]

Answer:

a.) UDP does not include data reassembly.

7 0
3 years ago
Read 2 more answers
Why was the microchip essential to improving computers?
-BARSIC- [3]
Because it downsized the scale of the computer itself.

5 0
3 years ago
What does modulate your voice mean
alexandr1967 [171]
To modulate your voice is to modify or gain more control of your voice. It basically means to change or adjust the pitch or tone.
7 0
3 years ago
Read 2 more answers
Choose the term that makes the sentence true.
Colt1911 [192]
The windows of death color is blue and with a sad face and says “your pc has ran to a problem and needs to restart. We’re just collecting some error info, and then we will restart it for you
8 0
3 years ago
Other questions:
  • In a two-sided tag, a(n) ____ tag indicates the content's end.
    7·2 answers
  • A user of the wireless network is unable to gain access to the network. The symptoms are:1.) Unable to connect to both internal
    6·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • How do the principles behind the Agile Manifesto suggest approaching architecture?A. Architecture emergesB. Architecture is not
    10·1 answer
  • Using the employment websites, search for part-time jobs that relate to the career fields you are interested in pursuing or to y
    12·2 answers
  • During project management, who executes tasks and produces the deliverables as stated in the project plan and as directed by the
    9·1 answer
  • Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system t
    10·1 answer
  • If you Buy my group clothing in R.o.b.l.o.x for a donation i will make you brainliest
    14·2 answers
  • Explain the steps in starting the MS Access from the Start Menu.​
    9·1 answer
  • Assign listNodes with all elements with a clasa name prog-lang
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!