1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brut [27]
3 years ago
14

The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets sho

uld be set up is done via establishing a(n) ___________ between the sender and receiver.
Computers and Technology
1 answer:
kow [346]3 years ago
4 0

Answer:

TCP connection(Transmission Control Protocol) is the correct answer of this question.

Explanation:

TCP guarantees data delivery and also means packets will be provided in the same order in which they were sent.Negotiation by the sender's transport layer with the receiver's transport layer to establish what size containers should be set up by maintaining a(n) TCP connection between the sender and the receiver.

  • Once diluted, it could also be used as a mouthwash, and may also double as a specific disinfectant.
  • TCP / IP is essential because it runs over the whole Internet.
You might be interested in
Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
Artyom0805 [142]

There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.

The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.

Secure Copy (SCP)  is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network.  PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.

Learn more about the PuTTY package from

brainly.com/question/13171394

8 0
2 years ago
Explain set associative mapping<br>​
gtnhenbr [62]
Set-associative mapping allows that each word that is present in the cache can have two or more words in the main memory for the same index address. Set associative cache mapping combines the best of direct and associative cache mapping techniques.
6 0
3 years ago
An Organization Chart to support the Appliance Warehouse case study The SWOT Analysis diagram you performed and created to suppo
Ulleksa [173]

<u>Explanation</u>:

Remember, the aim of SWOT Analysis is to perform analysis of a phenomenon or case.

Just as in any analysis it is followed by results and recommendations based on the set rules of the analysis.

<u>The Strengths, Weaknesses, Opportunity identified and Threats can translate to the mission statement </u>of a company. It is important to know that this statement is usually factual and accurate.

3 0
3 years ago
In modern computer memory, each location is normally composed of one byte.
Paraphin [41]
An actual parameter in a method call, or one of the values combined by an operator
4 0
3 years ago
Select all statements that correctly describe the ramifications of important features supported by modern DBMS.
lara [203]

Answer:  

"Option b and Option d" is the correct option for this question.

Explanation:

In the database, datatype belongs to the information storage medium, which can hold a specific type of value. There are several data types, which is used in database like integer, character, series, floating-point and array numbers, and the rules, that give levels of security to information are known as a security constraints. It may be either developed as rules on integrity, mathematical formalism rules or schematic rules, and other choices were wrong which can be described as follows:

  • In option a, The asserts, which is in any exchange in a database, should only modify the information, that is effected in acceptable ways is called consistency, that's why it is wrong.
  • In option c, The validity and accuracy of the data in the database can not be ensured, that's why it is wrong.
3 0
3 years ago
Other questions:
  • Code the function (insertNth list N insValue) which constructs a new list by inserting the specified insValue into the list afte
    6·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • Which technique helps you look confident as a speaker?
    15·1 answer
  • Why is the answer B?
    6·1 answer
  • Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post t
    15·1 answer
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • If anyone can help please and thank you before Nov 11th
    15·1 answer
  • If you hard working right now go to this EASY question
    9·2 answers
  • Ssssssssssssssssssssssssssssssssssssssssssssssssss 100 points for this answer too.
    10·1 answer
  • Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!