1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
7

What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f

unctions in a virtual circuit network?
Computers and Technology
1 answer:
PIT_PIT [208]3 years ago
7 0
1. Datagram-based network layer: Forwarding, Routing.
2. VC- based network layer: Forwarding, Routing, Call setup.
You might be interested in
In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or perm
Sholpan [36]

Answer:

Piracy.

Explanation:

Piracy refers to copying or duplicating contents and then selling it to market at lower prices without the owners knowledge or permission. Let's assume I designed a software for company "A" at the price of $2500, but someone inside from the company created a copy of that software and sold it in market at price of $200 without my knowledge or permission. This is what we call piracy.

3 0
3 years ago
Convert the following C program to C++.
ki77a [65]

Answer:

The program equivalent in C++ is:

<em>#include <cstdio></em>

<em>#include <cstdlib></em>

#define SIZE 5

using namespace std;

<em>int main(int argc, char *argv[]) {</em>

<em>int numerator = 25;</em>

<em>int denominator = 10;</em>

<em>FILE * inPut = fopen(argv[1], "r");</em>

<em>FILE * outPut = fopen(argv[2], "w");</em>

<em>float result = (float)numerator/denominator;</em>

<em>fprintf(outPut,"Result is %.2f\n", result);</em>

<em>float arr[SIZE];</em>

<em>for(int i = 0; i < SIZE; i++) {</em>

<em>fscanf(inPut, "%f", &arr[i]);</em>

<em>fprintf(outPut, "%7.4f\n", arr[i]);</em>

<em>}</em>

<em>return 0;</em>

<em>}</em>

Explanation:

See attachment for explanation.

Each line were numbered with equivalent line number in the C program

Download cpp
8 0
3 years ago
Which two protocols manage neighbor discovery processes on ipv4 networks?.
serious [3.7K]

Answer:

Which two protocols manage neighbor discovery processes on IPv4 networks? TCP and UDP BGP and OSPF ICMP and ARP IPv4 and IPv6

Key Links. Pricing.

Subjects. Medical & Nursing.

Company. About Us.

Find Us.

Explanation:

6 0
2 years ago
1) Design a class named Axolotl that holds attributes for an axolotl's name, weight, and color. Include methods to set and get e
crimeas [40]

what subject is this exactly?

5 0
2 years ago
The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. I
Talja [164]

Answer:

The correct answer to the following question will be "Instruction set architecture".

Explanation:

The Instruction Series Design is a component of the system that is accessible to the compiler and the programmer. It is also the distinction between hardware and software. We will describe in detail the set of instructions used in most of the microprocessors that are used today.

The processor ISA can be represented using 5 categories, these are as follows:

  • The RAM Running Memory.
  • Amount of clear operating names.
  • Location of operands.
  • Operations
  • Size and type of the operand.

Therefore, Instruction set architecture is the right answer.

4 0
3 years ago
Other questions:
  • You install an M.2 SSD card in an M.2 slot on a motherboard. When you boot up your system, you discover the DVD drive no longer
    15·1 answer
  • How does technology improve productivity at home? (Select all that apply.)
    5·1 answer
  • Advantages of heading attributes
    5·1 answer
  • Assume that a single page of printed text requires 52 lines of text, and that each line of text averaged 80 characters. If each
    9·1 answer
  • Why is it uncommon for users to perform searches directly in database tables?
    15·1 answer
  • A computer is performing a binary search on the sorted list of 7 numbers below.
    10·2 answers
  • The role of Operating system<br><br>​
    6·1 answer
  • What happens when the electrons flowing through the light bulb change direction?
    11·1 answer
  • Which wireless standard runs on both the 2.4 and 5 GHz frequencies?
    11·1 answer
  • Class.object.method is an example of using the ______<br> to access the elements of a class.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!