1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
3 years ago
6

WHAT DOES THE TRANSPORT LAYER USE TO MAKE SURE THAT A MESSAGE IS REASSWMBLED CORRECTLY ON THE RECEIVING DEVICES?

Computers and Technology
1 answer:
mrs_skeptik [129]3 years ago
6 0
The answer is  sequence  number
You might be interested in
Write an if/else statement that adds 1 to the variable minors if the variable age is less than 18, adds 1 to the variable adults
BARSIC [14]

Answer:

if (age < 18)  // check condition of variable age is less than 18

minors=minors+`1;

else if (age >=18 && age <=64)  //check condition of variable age between 18 to 64

adults=adults+1;

else  // check condition of variable age more than 65

seniors=seniors+1;

Explanation:

Here we checks the condition if the  variable age is less than 18 then it increment the value of variable 'minors' by 1  i.e, minors=minors+`1; .

if variable age is 18 through 64 then it increment the value of variable adults by 1 i.e,'adults'=adults+1;  otherwise increment the value of variable 'seniors ' by 1  i.e seniors=seniors+1;

3 0
4 years ago
Once you start designing the processing logic for each function of your software, you might end up throwing out your logical dat
vlabodo [156]

Answer:

B. True.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

An incremental model refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

Hence, an incremental method typically involves developing a system through repeated cycles and smaller portions at a time, enhancing and evolving the system over time.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

Hence, once you start designing the processing logic for each function of your software, you might end up throwing out your logical data model design and completely redesigning it because each function would use a specific processing logic respectively.

8 0
3 years ago
What aspect do you need to keep in mind when you add images in a Word document?
MrRissso [65]
Hey there!

You would have to keep in mind that you would have first, use the correct format and make sure that the format matches the requirements for the Microsoft word doc.

I believe that they would be the following:

PDF, JPDE,TIFF, and many more that would have to be able to except the images of the files.

I hope this helps you!
6 0
3 years ago
Real Player, Flash Player, and Shockwave are examples of
Harrizon [31]
B. Plug-ins. . . . . . . . (dots because of minimum. character thing)

7 0
4 years ago
What online game do you play on the internet and can I play with you on it?
UNO [17]

Answer:

None

Explanation:

I don't find online games safe and they scare me soo..

6 0
3 years ago
Other questions:
  • What does the following code print?double[] myList = {1, 5, 5, 5, 5, 1};double max = myList[0];int indexOfMax = 0;for (int i = 1
    8·1 answer
  • g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a
    10·1 answer
  • A source A producing fixed-length cells is required to use a Token Bucket Traffic Shaper (TBTS) of bucket capacity b=20 cell tok
    15·1 answer
  • An example of negative self-talk is:
    13·2 answers
  • Someone, please answer this.
    15·1 answer
  • Edhesive intro to cs term 2 8.9 practice
    13·2 answers
  • (10 points) Make a user interface to get 3 points from the user which will be placed on the coordinate plane. Then write a Pytho
    11·1 answer
  • Ask what kind of pet the user has. If they enter cat, print "Too bad...", if they enter dog, print "Lucky you!" (You can change
    9·1 answer
  • What three-key sequence will bring up the task manager or allow a user to log off or restart the computer?.
    8·1 answer
  • A safety procedure that enables a trusted party to have a copy of the encryption key is called key __________.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!