1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Licemer1 [7]
3 years ago
14

Suppose we provide a new implementation of the transport layer protocol tcp providing the same functionality using different alg

orithms. ⢠how does this impact operations at the application layer? ⢠how does this impact operations at the network layer?
Computers and Technology
1 answer:
Bess [88]3 years ago
8 0
If properly implemented, the API's (Application Programming Interface) won't change, so there would be no impact to the other layers. That's why networking is done as a stack, so that layers can be updated without affecting other layers.
You might be interested in
Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the cust
Jet001 [13]

Answer:

Operational CRM.

Explanation:

Operational CRM can be described as most of the programs that allow a company to taking care of the desires of the consumers. The structure links and maintains the selling, marketing, and customer support activities of a corporation, thus providing a structure that requires customer service.

So, the following answer is correct according to the statement.

7 0
3 years ago
Only the _________ can add users with passwords and limit user access to selected areas.
Iteru [2.4K]

Answer:

The answer to this question is "Quickbooks administrator.

Explanation:

The answer is the Quick books administrator because Quick books is a software that is used for accounting developed. It helps us to keep in mind all the expenses in the business and things like invoicing, reporting.In this software, we can add new users and give them permission. If we want to allow Users to access the software.

In the Quickbooks administrator, we can add the user with limited access also. So the correct answer is Quickbooks administrator.

8 0
3 years ago
Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____.
Vlad [161]

Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in latency.

<h3>What is 5G network ?</h3>

The 5G is known to be the fifth-generation technology standard that is often used for most broadband cellular networks.

Here, 5G networks will have lower latency when compared to 4G that is it is less than 1 ms than to 10 ms. This implies that data will zip via the network much faster.

Learn more about  5G network from

brainly.com/question/24664177

5 0
2 years ago
The idea generating technique most often used in writing business letter is ?
aivan3 [116]
Hihi!

The correct answer is free writing! Free writing <span>is a prewriting technique in which a person writes continuously for a set period of time without regard to spelling, grammar, or topic! People tend to use it because it produces raw, often unusable material, but helps </span>writers<span> overcome blocks of apathy and self-criticism!</span>

I hope I helped!
-Jailbaitasmr
6 0
3 years ago
Read 2 more answers
Which view is most often used to reorder slides in a presentation that has already been created?
riadik2000 [5.3K]

Answer:

Normal view

Explanation:

The normal view is best used because it is just to drag and drop

4 0
3 years ago
Read 2 more answers
Other questions:
  • An _________ is a phrase formed from the first letters of words in a set phrase or series of words a. Acronymic sentence c. Basi
    7·2 answers
  • Refers to the programs or instructions used to tell the computer hardware what to do.
    8·1 answer
  • Data governance consists of? A. the processes, methods, and techniques to ensure that data is of high quality, reliable, and uni
    11·1 answer
  • Communications technology and the Internet can be used to reduce the time and costs involved in disseminating financial statemen
    14·1 answer
  • " In which software generation did the distinction between systems programmers and other programmers first surface?"
    15·1 answer
  • Dora has inserted a text box into a Word document that she is formatting. Which strategy will not format text boxes? Create a li
    6·2 answers
  • Three types of keys on the keyboard​
    15·2 answers
  • SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SU
    6·2 answers
  • A while loop is frequently used to ______________ data.
    5·1 answer
  • What do you mean by computer ethics?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!