1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
13

Which quality of service (QoS) mechanism provided by the network does real-time transport protocol (RTP) rely on to guarantee a

certain QoS for the data streams it carries
Computers and Technology
1 answer:
Radda [10]3 years ago
8 0

Answer:

The real-time transport protocol (RTP) carries the audio and video data for streaming and uses the real-time control Protocol to analyse the quality of service and synchronisation. The RTP uses the user datagram protocol ( UDP) to transmit media data and has a recommended Voice over IP configuration.

Explanation:

RTP is a network protocol used alongside RTCP to transmit video and audio file over IP networks and to synchronise and maintain its quality of service.

You might be interested in
Within a word processing program, predesigned files that have layout and some page elements already completed are called
dexar [7]

Answer:

I think it's B) templates

     

                   Sorry if it's wrong I'm not sure!!

Explanation:

4 0
3 years ago
The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured
natka813 [3]

Answer:

This is a failure of prevention model of computer security

Explanation:

Because the firewall was misconfigured so attack prevention mechanism failed to resist the attack and the security of computer is compromised. Prevention is an important model of operational security because <em>protection </em>is possible firstly attacks are prevented from targets and if not prevented and failed then they are detected and finally security department respond to that attack.

protection = <em>prevention   </em>if <em>prevention </em>failed than (detection+response)

4 0
3 years ago
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
quester [9]

Answer:

Option B is correct.

Explanation:

As such an application programmer, Shania recently began a new work. The first assignment was to create an earlier software available on certain devices, developed for Android.  

So, she using cross-platform software to compose application code that might convert the current android application code across various native versions to makes it much simpler and quicker for her job.

Other options are incorrect because they are not related to the following scenario.

4 0
3 years ago
Define latency and jitter for service flow in a fixed wireless system.
Marianna [84]

Answer:

Jitter refers to deviations in displacement of or deviation in the signal pulses in a HF digital signal. Latency  refers to the time interval between the response and stimulation or the basic delay between the effect and cause in service flow.

Explanation:

4 0
3 years ago
Read 2 more answers
Other than technology and start-up costs what are two
sattari [20]
The other two particular cases of hindrances that could keep an organization or individual from entering a market are the beneath: 
Individual attributes - there are sure occupations that specific criminals are not permitted to do - sex wrongdoers can't start up youngster mind offices; individuals with associations with composed wrongdoing shouldn't have the capacity to begin gambling clubs, and so on. There are employments that outsiders can't do. Furthermore, for a few employments, you require unique trusted status. 
Local legal restricti - you can't simply begin a taxicab organization in New York, you need to have emblems for your taxis. It is practically difficult to get one from the city, so you regularly need to purchase another person out
6 0
3 years ago
Other questions:
  • Aubrey didnt like to use graphics or images on her slides. She preferred to use only a title for her slides and bullet-poinged t
    14·2 answers
  • It is important that researchers design rigorous study methods to eliminate: a. inferences. b. the need for a CONSORT flow chart
    10·1 answer
  • What is the best overall approach to education and career development for IT professionals?
    14·1 answer
  • Load the titanic sample dataset from the Seaborn library into Python using a Pandas dataframe, and visualize the dataset. Create
    10·1 answer
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. The company's pr
    10·1 answer
  • As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a mini
    14·1 answer
  • Which term refers to the capability of a switch to copy data from any or all physical ports on a switch to a single physical por
    5·1 answer
  • What is a URI (include example)
    7·1 answer
  • Anyone know the answer I need help
    12·1 answer
  • Why is my internet slow even though the speed test says it is fast
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!