1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
15

"what are the problems with tcp over wireless network?"

Computers and Technology
1 answer:
Murrr4er [49]3 years ago
8 0

The TCP protocol treats bit errors as congestion problems, which leads to a sub-optimal error correction. Wireless networks have a much higher bit error rate than wired ones, and the TCP protocol is not optimized for that.

You might be interested in
Frequently used commands can be placed in or on the _____ in the top left corner of the window.
podryga [215]

Answer:

b. Quick Access Toolbar                                        

Explanation:

  • Quick Access Toolbar is a customizable toolbar that is displayed in Microsoft Excel, Microsoft Word, and other Office products.
  • It appears in the top left corner of the window by default.  
  • QAT provides with quick access to frequently used features e.g. the Save, Undo, Redo features.
  • When you click on the drop down menu of QAT, it allows you to customize QAT. This enables you to add and remove the commands that are displayed in the toolbar. These are default commands however, it allows you to add your own commands. You can add commands to the QAT that you frequently use. You can import or export these modifications.
  • For example Excel Quick Access Toolbar contains only 3 buttons by default Save, Undo and Redo.

7 0
2 years ago
Steps to copy and paste text/information from website to Ms-word using keyboard​
Greeley [361]

Answer: Highlight the text you want to copy. Use the shortcut key combination Ctrl + C on a PC or Command + C on a Mac to copy the text. Move the text cursor to where you want to paste the text. Press Ctrl + V on a PC or Command + V on a Mac to paste the text

Explanation:

just copy and past by highlighting the text you want and clicking ctrl and c at the same time then ctrl and v to put it on word

8 0
2 years ago
When trying to remember a list of words, a person may choose a word to which they "hang" their memories on. This type of mnemoni
nika2105 [10]

Answer:

Peg

Explanation:

This is known as the "peg technique." The name comes from the fact that we usually employ pegs to hang clothes to dry. In this memory aid, the person who wants to memorize something creates mental associations between two concrete objects. This is done in a one-to-one fashion that links all the words together.

6 0
3 years ago
What are three recommendations for reducing risk and improving the privacy of your personal information while using social media
viktelen [127]

Answer:

1. Treat the “about me” fields as optional.

2. Become a master of privacy settings.

3. Know the people you friend.

Explanation:

1. Treat the “about me” fields as optional.

Because these fields are offered, however, doesn’t mean you must fill them out. Consider offering a general version of the information requested or simply leaving the field blank. For instance, listing only your state of residence, instead of both city and state, can make it harder for others to figure out exactly where you live.

2. Become a master of privacy settings.

All social media sites give you the option to limit post viewing to specific audiences. Take the time to explore these settings, try different options, and become a master of their use.

3. Know the people you friend.

Once upon a time, social media users competed with one another to have the largest number of connections. Today, however, smart social media users know that the more people you’re connected to, the harder it is to control what happens to the information you post. Make sure you know the people you add on social media, in real life if possible. Don’t hesitate to use the “block” feature when the situation seems to call for it.

6 0
3 years ago
java The maximum-valued element of an integer-valued array can be recursively calculated as follows: If the array has a single e
adoni [48]

Answer:

see explaination

Explanation:

MaxArray.java

public class MaxArray{

public static void main(String[] args) {

int a[] = {1,2,5,4,3};

int max = max (a, 5);

System.out.println("Max value is "+max);

}

public static int max (int a[],int size){

if (size > 0) {

return Math.max(a[size-1], max(a, size-1));

} else {

return a[0];

}

}

}

Output:

MaxArray

7 0
3 years ago
Other questions:
  • Attention merchants define
    5·1 answer
  • If you are viewing a webpage with customized or regenerated content, such as updated stock quotes, what type of webpage are you
    14·1 answer
  • What tool is included with windows 8 that will help you connect to the directaccess server when you have problems and can be use
    6·1 answer
  • Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
    5·1 answer
  • Malcolm is part of a team developing a new smartphone app to track traffic patterns. Because team members are located throughout
    12·1 answer
  • What happens when the following code segment executes if test.txt does not exist?:<br> A,B,C,D?
    7·1 answer
  • The IntList class contains code for an integer list class. Study it; notice that the only things you can do are: create a list o
    7·1 answer
  • To drive defensively means taking proactive measures to avoid accident situations regardless of their potential causes.
    6·2 answers
  • The best way to take control of the first page of Google is to
    14·1 answer
  • Which Windows registry hive stores information about object linking and embedding (OLE) registrations
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!