1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
7

A dropped packet is often referred to as a _____________.

Computers and Technology
1 answer:
rjkz [21]3 years ago
3 0
The answer to this question is the "connection oriented sessions", this is also referred to us as dropped packet where the packet contains a lot of information. When packet sent, we need to check for delivery and when the packet is being dropped we need to resend it and repeat the procedure.
You might be interested in
My home PC has IP address 192.168.1.22 and connects to the Internet through a NAT router. Assume I am downloading a web page fro
alekssr [168]

Answer and Explanation:

There are three sections to the inquiry.  

1. what occurs inside the PC or host when a bundle is produced by an application.  

2.how it goes from one host that is a source to another host that is a goal with numerous switches sitting in the middle.  

3.what goes inside goal have when it gets a parcel on the system.  

how about we examine individually  

Handling bundle at source machine:  

The application creates a bundle to be sent on the system and sends it to the layer beneath.  

The following layer is known as a vehicle layer which oversees start to finish correspondence between two machines. The convention utilized can be TCP or UDP. What is the contrast between these two conventions is another subject by and large.  

When the parcel is framed at the vehicle layer, it is sent to the system layer which includes source and goal IP in the bundle. A most significant field which is included at IP or system layer is Time To Live (TTL) which is utilized by middle switches/changes to choose if a parcel should be sent or not. (How goal IP is found?)  

After the system layer, the parcel arrives at the information connection or MAC layer, where the source and goal MAC address of machines are included. We will perceive how these fields change between each two neighbors. (How goal MAC is found?)  

The information interface layer pushes this bundle to the physical layer where it is sent as a flood of "0" and "1" on the physical medium accessible.  

Preparing a bundle at switch:  

Steering  

There are three cases which may happen when the switch investigates the directing table for goal IP  

1. On the off chance that there is a section relating to goal IP, we get the interface name the parcel ought to be sent to.  

2. On the off chance that there is no immediate passage, at that point IP is changed over into organize IP utilizing the veil and afterward checked once more. It ought to be noticed that the longest prefix match to locate the best sending interface.  

3. In the case of nothing matches, at that point the switch just advances it to the default goal designed.  

Sending  

Epitome  

Preparing parcel at the goal have  

The parcel is gotten at arrange card, physical layer, which produces a hinder to CPU and CPU peruses bundle in,  

At the information connect layer, goal MAC address is verified whether the parcel is bound to this machine, If indeed, the bundle is sent up to the system layer.  

At the IP layer, parcel approval like checksum confirmation, and so on is done and afterward gave to the applicable vehicle layer.  

Transport later at that point gives it to the fitting port with the goal that it arrives at the right application.

5 0
3 years ago
The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored.
Genrish500 [490]

Answer:

Backup copy

Explanation:

system restore point is called a backup or backup copy of the system, this point keeps the inicial setting or configuration on the software, we usually use this tool when we're having some issues with the software, usually during the installation process  of a new software, letting us to save the data and off course with this point created the user could revert the issues or fix the problems occuring in the configuration.

5 0
3 years ago
Do Violent Video Games Make People More violent in Real Life ?
vova2212 [387]
To be honest, NO. Its just a videogame but i see what you are saying...
4 0
3 years ago
Write a Python program string_functions.py that defines several functions. Each function re-implements Python's built-in string
Svetach [21]

Answer:

def length( mystring):

   count = 0

   for i in mystring:

       count += 1

   return count

def reversed( mystring):

   strlist = []

   for i in range(length(mystring)):

       strlist.append(mystring[(length(mystring) - 1) - i])

       txt = "".join(strlist)

   return txt

string = 'Yolanda'

print(reversed(string))

Explanation:

The python module defines two functions 'reversed' and 'length'. The length function counts the number of characters in a string variable while the reversed function reverses the string variable value.

3 0
2 years ago
Which of the following is NOT one of the three basic structures used to solved logical problems?
Oliga [24]
I think module is not one of the theee basic structure
8 0
3 years ago
Other questions:
  • Classify the given items as belonging to the public domain or protected by copyright law.
    6·2 answers
  • A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users
    12·1 answer
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • Laura is confused with the spelling of the word pronunciation. She types the word pronunciation. Which feature of the auto corre
    8·2 answers
  • In a system using the relocatable dynamic partitions scheme, given the following situation (and using decimal form): Job Q is lo
    5·1 answer
  • Given the availability of an ofstream object named output, write the other statements necessary to write the string "3.14159" in
    8·1 answer
  • Which one of the following items is an example of software?
    12·2 answers
  • When approaching a bicyclist from the rear, you should slow down and
    8·1 answer
  • What is the answer 11100+01010​
    8·1 answer
  • When the CPU performs the work described in the commands,
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!