1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
3 years ago
7

61:39 A communication sent through Transmission Control Protocol (TCP) arrives out of order. What allows the data to be put back

together in the correct order? Preamble Acknowledgement number Checksum Sequence numbers
Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
7 0

Answer:

Sequence Numbers

Explanation:

In the transmission control protocol, the sequence number are used to put data back in order.

It is the number pattern that follows sequence. This is the number pattern which interprets data before they are returned by the recipient as an acknowledgement with its numbers.

When a sent data is out of order, the sequence number works towards correcting the sequence before sending its acknowledgement.

You might be interested in
Definition of the term social factor and explain why texting while driving can be classified as a social factor causing accident
sergij07 [2.7K]
Social factor - Something that affects you!
Texting and driving is classified as a social factor because your phone is the reason why you crashed your car.
8 0
3 years ago
Words like "free" or "percent off" will not only trigger spam filters for your email, but will also ___________
weeeeeb [17]

Answer:

eliminasnados

Explanation:

6 0
3 years ago
Let T(n) denote the running time for the Sort-and-Count algorithm (below). Sort-and-Count(L) { if list L has one element return
butalik [34]

Answer:

The answer is "\bold{T(n) = 2T(\frac{n}{2}) + n}"

Explanation:

Given:

The Merge-And-Count of (A,B) runs in time |Al+IB|

T(n) recurrence=?

Calculating the value of the recurrence:

\to  T(n) = T(\frac{n}{2}) + T(\frac{n}{2}) + f(|A| + |B|)\\\\  \therefore f(|A| + |B|) = n\\\\ \to T(n) = 2T(\frac{n}{2}) + n

7 0
3 years ago
What other identifiers would you need to alter in a cloned virtual machine to be sure it was unique? What might happen if these
Romashka [77]

Answer:

Following identifiers needs to be altered in cloned VM.

  1. Changing the IP address
  2. Selecting Ethernet Ports
  3. Rename the Pointers
  4. Renaming the Second Disk Drive
  5. Host names must be unique
  6. Rename the VM name

Explanation:

When we clone the VM, we have to make sure that Cloned VM should have unique system information and network addresses in and out of guest OS.

If UUID’s of all cloned VM's are different then DHCP will get separate ip addresses for those. Suppose if the IP addresses are static or If the IP address was hardcoded then it has to be changed to new IP address manually. If this is not done then it will cause duplicate IP’s and will cause networking issues.

When Cloned VM is created then the ethernet port has to be chosen correctly to make sure that LAN networking is correct.

You should specify the disk capacity. If you choose disk capacity as single file then it will create one vmdk file. So, specify the correct disk capacity, If you did not choose the disk file as single file then you may end up having multiple .vmdk files. So in that case you need to rename the pointers of copy of vmdk files.

Rename the Second Disk Drive. For example : You may find two VM files with VM Copy.vmdk, So you have to rename second disk to VM Copy-1.vmdk or any other name.

The cloned VM copies the parent virtual machine and it also includes the VM name. To avoid problems caused by having VM's with duplicate names on the network, give the VM in the cloned VM a unique name.

You have to make sure that hostnames are different as well. Hostname resolution will lead to conflict if its same on both VM's.

7 0
4 years ago
Explain how a message is transmitted from one computer to another using layers.
nevsk [136]
I need some answer chouices but they use iphones
7 0
3 years ago
Other questions:
  • Printed versions of your presentation that contain the slides and blank lines below are called speakers notes
    11·2 answers
  • Canadian Tire is one of Canada’s largest companies. They operate four large distribution centers service over 470 tire retail ou
    5·1 answer
  • A quick boot allows you to do what?
    7·2 answers
  • Which is an example of Raw Input?
    11·1 answer
  • The region which satisfies all of the constraints in graphical linear programming is called the:
    8·1 answer
  • To properly insert a memory module, you must locate the direction of the ______ .
    14·1 answer
  • A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' p
    12·1 answer
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • You are in charge of an event at work. You want to plan and schedule events and resourse. What type of software should you use?
    14·2 answers
  • Someone wanna be in a meeting with me <br><br><br> Code: rrx-ofrw-ocj
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!