1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
15

Suppose we eliminate tcp and instead rely exclusively on udp as our only transport layer protocol. ⢠how does this impact opera

tions at the application layer? ⢠how does this impact operations at the network layer?
Computers and Technology
1 answer:
evablogger [386]3 years ago
8 0
TCP is a reliable protocol. Verification of the data (to an extent) is performed. UDP is an unreliable protocol. It's a "fire and forget" protocol. Since the verification ( packet counts, checksums ) isn't being done, the application[s] have to do it.
You might be interested in
Who want followers on Instagram... gotta follow back
Alexxx [7]

Explanation:

I dont have Instagram....

6 0
3 years ago
Read 2 more answers
Rasheed is memorizing his multiplication tables by using flash cards. He does this frequently enough that eventually he does not
slavikrds [6]

Answer:

Long-term memory

Explanation:

There are two common types of memory - Long-term and short-term.

In short-term memory, information are stored just for a very short time before they are eventually discarded or transferred to the long-term memory. It is sometimes called working memory. For example, short-time memory can be used to remember that a particular event is going to be by 12pm today. After the event, the information might either be discarded or pushed to the long-term memory.

In long-term memory, information are stored for a very long term, almost permanently. For example, long-term memory enables you to remember an event that has taken place in the past. In the case of Rasheed, he has so much learned the multiplication tables in such a way that information on the tables have been stored indefinitely in a part of his brain called hippocampus. Every time he needs the multiplication tables, they are always available. So he is already taking advantage of the long-term memory.

4 0
3 years ago
Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the f
Andru [333]

user_str1 = str ( input ("Please enter a phrase: "))

user_str2 = str ( input("Please enter a second phrase: "))

def strcmp (word):

user_in1 = int (len(user_str1))

user_in2 = int (len(user_str2))

if user_in1 > user_in2:

return "Your first phrase is longer"

elif user_in1 < user_in2:

return "Your second phrase is longer"

else:

return "Your phrases are of equal length"

3 0
4 years ago
HELP:
Andrews [41]

Answer:

Id say its about 21

Explanation:

4 0
3 years ago
What is the term for a calculation (using encryption technologies) based on the contents of a disk or file that are engineered s
Helga [31]

Answer:

Cyclic Redundancy Check

Explanation:

Cyclic Redundancy check is used in networking and storage devices. This term is used for even small changes in the source data that will produce significantly different checksum results.

8 0
3 years ago
Other questions:
  • ____ are specially denoted text or graphics on a web page, that, when clicked, open a web page containing related content.
    13·1 answer
  • If you bury a story on digg what have you done?
    7·2 answers
  • In what way(s) did the password you tried to use not meet the password policy requirements?
    14·1 answer
  • The Microsoft Developer Network is an example of a software development company. software development marketplace. developer for
    5·1 answer
  • What is autofill in a excel spreadsheet?
    7·1 answer
  • The number 1 represent what state in binary code
    9·1 answer
  • Signals that can travel in only one direction on a medium are referred to as what type of signal?
    12·1 answer
  • A metacharacter is a character that has a special meaning assigned to it and is recognized as part of a scripting or programming
    9·1 answer
  • GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trade
    7·1 answer
  • Jjgdg gegg tget t446v
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!