1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
3 years ago
7

61:39 A communication sent through Transmission Control Protocol (TCP) arrives out of order. What allows the data to be put back

together in the correct order? Preamble Acknowledgement number Checksum Sequence numbers
Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
7 0

Answer:

Sequence Numbers

Explanation:

In the transmission control protocol, the sequence number are used to put data back in order.

It is the number pattern that follows sequence. This is the number pattern which interprets data before they are returned by the recipient as an acknowledgement with its numbers.

When a sent data is out of order, the sequence number works towards correcting the sequence before sending its acknowledgement.

You might be interested in
In the following nested loop structure, which loop does the program EXIT first?
seropon [69]

Answer:

The loops are nested, and the program ends when loop 1 is completed. Since loop 4 is the innermost one, that one is completed first.

7 0
3 years ago
In the Word 2016 window, where is the Status bar located?
klasskru [66]

Answer:

I hope this helps

Explanation:

The answer is B

4 0
3 years ago
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
You are reviewing the style sheet code written by a colleague and notice several rules that are enclosed between the /* and */ c
Flauer [41]

Answer:

Nothing will happen.

Explanation:

The rules written between /* and */ will be ignored because /* and */ are the standard way of writing comment in a style sheet code. So, whatever fall in between them will be ignored during rendering of the page.

7 0
3 years ago
State why hexadecimal is used to display the error code
maxonik [38]
“Hexadecimal uses digits that more closely resemble our usual base-10 counting system and it's therefore easier to decide at a glance how big a number like e7 is as opposed to 11100111. Higher information density. With 2 hexadecimal digits, we can express any number from 0 to 255.”
7 0
3 years ago
Other questions:
  • A _____ is a member function that is automatically called when a class object is created.
    13·1 answer
  • What information medium is used to access information from the Internet in the form of HTML pages?
    12·1 answer
  • This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. (1) The given p
    14·1 answer
  • How to Create a while loop
    6·2 answers
  • Making sure that your business has something special and distinct to offer is known as?
    12·1 answer
  • / Looks up author of selected books
    15·1 answer
  • (9.10 Code Practice: Question 1)
    12·1 answer
  • 2ND LAST QUESTION
    13·1 answer
  • Four examples of computer virus​
    10·1 answer
  • you are setting up an active directory environment for a business that has three locations and 300 users. you want the users to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!