1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
4 years ago
13

What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote

network device?
Computers and Technology
1 answer:
kramer4 years ago
5 0

Answer:

<em>Source port numbers and Destination </em>

Explanation:

Sockets are also <em>known as the source and destination IP addresses are combined with the  source and destination port numbers.  </em>

The socket is used to define the client's request for server and network.  

Thousands of hosts are communicating with millions of separate servers every day.

You might be interested in
What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usag
cluponka [151]

A world  have 2^128 (340 undecillion) of IPv addresses that helps to connect to the internet. IPv6 addresses can make it easier for working organizational teams connecting to the Internet, IP addresses that are created by IPv6 are 128 bits.

<h3>What is internet?</h3>

Internet is the system  uses the Internet protocol suite (TCP/IP)  and interconnected computer networks that communicate between two or more individuals.

Today, almost 20 IP addresses are taken by7 each home for each electronic device. The internet usage is so wide, that even a simple task  is not possible without it. Even a simple task can be done using internet.

Learn more about internet.

brainly.com/question/13308791

#SPJ1

5 0
2 years ago
2 What Java keyword is used to create a subclass? interface. extends. implements. inherits.
n200080 [17]

Answer:

extends

Explanation:

When you create a subclass, you basically say "I'm creating a new class, but for now it will look and behave the same as that other class", then you add its own personality.

The syntax is:

class SubClass extends SuperClass

Where SubClass is your new subclass what inherits methods and variables from the SuperClass.

So, if you add nothing to the SubClass, it will be a carbon copy of the SuperClass. But you can add methods and variables exclusive to this SubClass that the SuperClass won't have.

5 0
3 years ago
A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin
pav-90 [236]

Answer:

False ( B )

Explanation:

Of  the seven IT  infrastructure domains The USER domain was not at risk because the User Domain is not task with handling the sharing of data or Mutual communication between users in a Typical IT infrastructure.

The domain charged with such responsibility is The LAN domain because the LAN domain is charged with the sharing of information between the USERS and maintaining good mutual communication, and since the relationship has become sour, the sharing of information between the users will suffer the most and it will be at a high risk

5 0
3 years ago
Some smartphones use ______ text, where you press one key on the keyboard or keypad for each letter in a word, and software on t
Oksanka [162]

Answer:

The answer is "predictive".

Explanation:

The statement lacks some details, which can be answered by the choice of the question:

A. Presumptive .

B. suggestive .

C. interpretive.

D. predictive.

Predictive text is considered to be auto-correct text as well. It is an input technique, which allows people to type words onto a smartphone throughout the text field. It's focused on both the significance of the words and letters in the message, and certain choices were wrong, which can be defined as follows:

  • Option B and Option D both were wrong because it provides the synonyms of the words.
  • In option C It is wrong because it is a text version.

5 0
4 years ago
(ANSWER!)
andreev551 [17]

Answer:

it doesn't? maybe it helps by resetting it but other than that I don't think It does anything

4 0
3 years ago
Read 2 more answers
Other questions:
  • The _____ text wrapping option wraps text around the object, with the text forming to the shape of the object.
    14·1 answer
  • What Coding program does UNITY use?
    6·1 answer
  • How do you do these two questions? The first might have multiple answers and the second will have only one answer.
    14·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    8·1 answer
  • What does the revolver do computer science​
    9·1 answer
  • Which are the following 4 things something must be able to do in order to be a computer? *
    9·1 answer
  • During which phase of the writing process is it best to have other
    11·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
  • In the program evaluation and review technique (PERT), a delay in ________ will cause the entire project to fall behind. Multipl
    7·1 answer
  • You are querying a database of manufacturing company suppliers. The column name for supplier identification numbers is supplier_
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!