1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
7

A dropped packet is often referred to as a _____________.

Computers and Technology
1 answer:
rjkz [21]3 years ago
3 0
The answer to this question is the "connection oriented sessions", this is also referred to us as dropped packet where the packet contains a lot of information. When packet sent, we need to check for delivery and when the packet is being dropped we need to resend it and repeat the procedure.
You might be interested in
What is the output of the following program?
Angelina_Jolie [31]

Answer:

the output of that code would be invalid syntax since the line,

>>> numA = numA * 5

is not indented.

The output of

>>> numA = 2

>>> while numA < 30:

>>> numA = numA * 5

>>> print(numA)

would be 50.

3 0
3 years ago
Read 2 more answers
Which institution developed outside the limits of the written costitution of the united states ?
nignag [31]
The answer is D. Electoral College
4 0
3 years ago
Who are the best candidates for members of SkillsUSA? Check all that apply. Adolph wants to be an Elementary School Teacher. Rub
SpyIntel [72]

Answer:

On edge its 3,4,5,6

Explanation:

3 0
4 years ago
Read 2 more answers
Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be moni
chubhunter [2.5K]

Answer:

She can the following tool to protect the link:

Secure Socket Shell

Explanation:

Secure Socket Shell:

It is also known as secure shell and has short form SSH. A method that is used to secure the communication over the unprotected network. This network protocol was introduced in 1995 and its most common use include the managing of different systems as the network administrator can execute different commands remotely.

In our question, Jane can use Secure socket shell in order to communicate the information to the remote end without being monitored by the adversaries.

8 0
4 years ago
Write the difference between:
JulsSmile [24]

Answer:

RAM is used to store computer programs and data that CPU needs in real time. ... RAM data is volatile and is erased once computer is switched off. HDD,hard disk has permanent storage and it is used to store user specific data and operating system file

3 0
4 years ago
Read 2 more answers
Other questions:
  • Students recently created a Gaming Club at their school. On Friday every week, students bring in their gaming consoles (Xbox, Pl
    7·2 answers
  • What was the benefit of a caloytpe over a daguerreotype
    6·2 answers
  • A graphic design student is putting the finishing touches on her PowerPoint presentation for her speech. She is carefully analyz
    12·1 answer
  • GPS data can be used to track the rate and direction of plate movement. If a GPS unit measures a latitude velocity of 28.2 mm/yr
    8·1 answer
  • PLEASE HELP what is the mechanical advantage of a wheel with a radius of 8.0 cm connected with a axle with a radius of 2.5 cm?
    12·2 answers
  • What features do plain text editors support?
    12·1 answer
  • 1) If a robot has a 3 bit instruction set and needs 20 instructions to reach its destination, how many bits of memory are requir
    5·1 answer
  • Miley met up with a bunch of her college friends after several years. She told them that she works for the sound department of a
    5·1 answer
  • What time is it NOW??
    11·2 answers
  • When a support agent does not know the answer to a question, a good incident management strategy is to tell the user ____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!