1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stels [109]
3 years ago
12

Why is fragmentation of an ip packet sometimes required?

Computers and Technology
1 answer:
Zielflug [23.3K]3 years ago
8 0
A. Because an IP packet can hold more data than a frame.
You might be interested in
Arctic Gear LLC. recently adopted a new ERP​ system, but quickly found that it​ wasn't a perfect fit with their existing procedu
inysia [295]

Answer:

The answer is "Option c".

Explanation:

GAP analyses are worked to specify the business operations and function. It  helps developed the ERP framework across the analysis process, and the variance in business, which uses the existing resource, that should be defined, reported and allowed, and wrong choices can be described as follows:

  • In option a, It described its action or a failure to alter, that's why it is wrong.
  • In option b, This technique fails the system, that's why it is wrong.
  • In option d, It combines the potential for social application, that's why it is wrong.
4 0
3 years ago
Write the features of Mark-I.​
kotegsom [21]

Answer:

mark- I was enormous in size,measuring 8 feet high,51 feet long and 3 feet deep it weighs tons used , 530 miles of wire and 730,000 separated plant.

4 0
3 years ago
It is good practice, however, for policy _________________________ to solicit input both from technically adept information secu
s2008m [1.1K]

Answer:

It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

<u>Explanation</u>

Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.

7 0
3 years ago
What is best defined as a phishing email that is targeted directly at you?.
Inga [223]

Answer:

spear phishing hope its right

6 0
3 years ago
How to play Drinkopoly game?
professor190 [17]
Answer:
Never heard of that lol
3 0
3 years ago
Other questions:
  • Use NumPy to recreate your answer to Question 1b. The input parameters will both be python lists, so you will need to convert th
    8·1 answer
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • How important is technology in education? what technology-related skills can you contribute to a school district answers?
    13·1 answer
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • A speaker takes a variety of information from the results of a web search, and puts it together in an outline to make up his spe
    8·1 answer
  • In which of the following situations will a macro make your work more efficient?
    9·1 answer
  • Line spacing refers to the amount of space between each line in a paragraph. A. True B. False
    14·2 answers
  • Hi need help on this <br> what is cyberspace
    14·1 answer
  • Is a free verse a poetry that has no images
    5·2 answers
  • The rectangle shape in flowchart is used for
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!