1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
15

Suppose we eliminate tcp and instead rely exclusively on udp as our only transport layer protocol. ⢠how does this impact opera

tions at the application layer? ⢠how does this impact operations at the network layer?
Computers and Technology
1 answer:
evablogger [386]3 years ago
8 0
TCP is a reliable protocol. Verification of the data (to an extent) is performed. UDP is an unreliable protocol. It's a "fire and forget" protocol. Since the verification ( packet counts, checksums ) isn't being done, the application[s] have to do it.
You might be interested in
Pseudocode is an improvement over the IPO chart because it lays out the a0 sequence of steps for a particular program.
katrin2010 [14]

Answer: Pseudocode represents a language like solution

Explanation:

Pseudocode can be defined as one of the informal ways of programming whose description doesn't require any strict programming language syntax or even underlying technological considerations because it's evident that, it's not actually a real programming language . It is used major for an outline/rough draft of a required program. It also summarizes the flow of program, excluding underlying details. Designers usually write pseudocode in order for programmers to fathom the project's requirements of the software and align code appropriately.

5 0
4 years ago
Read 2 more answers
What happens during the production stage
PSYCHO15rus [73]

Answer:

Production is where the principal photography for the movie or TV show takes place.

Explanation:

During rehearsals and camera blocking, Stand-Ins work with the Director, Assistant Director, camera crew, and other crew members to block out actor movements and lighting set-ups for a scene.

4 0
3 years ago
P2p networks are most commonly used in home networks. <br> a. True <br> b. False
postnew [5]
<span>The statement that P2P networks are most commonly used in home networks is true. 
</span>P2P stands for peer-to-peer communication network. It is an example of local administration. <span> Two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software with P2P type of network.</span>
6 0
4 years ago
Example of analog computer and digital computer ​
Nataliya [291]
Give some famous examples of analog computers. Ans. Some examples are operational amplifiers, mechanical integrators, slide rules, tide predictors, electric integrators, etc. These are in use to solve the problems related to partial differential equations, electronic machines, and also neural networks.(Analog). Examples of a digital electronic computers include the IBM PC, the Apple Macintosh as well as modern smartphones. ... An example of a parallel computation system using the abacus would be a group of human computers using a number of abacus machines for computation and communicating using natural language.(Digital)
4 0
3 years ago
i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to
Sladkaya [172]

Since your computer add new tabs when you are working and the thing to do are:

  • You may manually scan for malware as well.
  • Launch Chrome.
  • Click More. Settings in the top right corner.
  • After clicking Advanced Reset, tidy up. tidy up the PC.
  • Choose Find.
  • Click Delete if you are prompted to remove undesirable software. Your computer might need to be restarted.
<h3>Why do my computer's tabs keep growing?</h3>

The chance exists that some form of malware has been installed on your computer, and this is what is causing the tabs to open randomly. Corrupt Installation: It's also possible that this problem is being brought on by a corrupt Chrome browser installation.

To access the Chrome Settings menu, enter chrome:/settings and press Enter. In the Extensions tab, locate New Tab.

One can still solve the problem by: To access the Chrome Settings menu, enter chrome:/settings into the address bar of Chrome and hit Enter. Click on the trash can icon on the "Extensions" tab of the Chrome Settings menu.

Please look for any further dubious extensions that you do not use or are unsure of their origin and remove them as well.

Learn more about Malware attack from

brainly.com/question/17311729
#SPJ1

5 0
1 year ago
Other questions:
  • While shopping online for gardening supplies, Lana visits a website she had heard advertised on Home and Garden Television (HGTV
    5·1 answer
  • Have main create two objects: setA and setB.Input the values into setA (end with a 0 or negative) and input the values into setB
    12·1 answer
  • if your instructors teaching style is very different from your learning preference your best choice is to one work on your weake
    10·1 answer
  • Factor f(x)=x^3-6x^2+9x
    12·1 answer
  • We wish to design a decoder, with three inputs, x, y, z, and eight active high outputs, labeled 0, 1, 2, 3, 4, 5, 6, 7. There is
    5·1 answer
  • What do you use for soaking hands and holding soapy water​
    7·2 answers
  • Cooper Technologies is a technology company that offers many IT services in Chicago. The company's services and products include
    5·1 answer
  • Which statement about parallax scrolling is true?
    6·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    8·1 answer
  • How does beamforming improve network service?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!