1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Licemer1 [7]
4 years ago
14

Suppose we provide a new implementation of the transport layer protocol tcp providing the same functionality using different alg

orithms. ⢠how does this impact operations at the application layer? ⢠how does this impact operations at the network layer?
Computers and Technology
1 answer:
Bess [88]4 years ago
8 0
If properly implemented, the API's (Application Programming Interface) won't change, so there would be no impact to the other layers. That's why networking is done as a stack, so that layers can be updated without affecting other layers.
You might be interested in
Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
miskamm [114]

Personally I just leave them in my inbox because who cares, Alison should; however, move them to the trash I guess

7 0
3 years ago
"Look at the following code. Which line will cause a compiler error?
crimeas [40]

Answer:

i got a feeling c

Explanation:

5 0
3 years ago
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
When can you access the BIOS setup utility?
Burka [1]
During the boot process. You hold down a certain key (usually F2 or F8 (Function keys)), the beginning of the boot process checks for the keypress, and if it's detected, launches the utility.
6 0
3 years ago
Read 2 more answers
Java: which expression is evaluated first
nignag [31]

Answer:c ll d  

Explanation:

cus they are inside ()--parantheses

5 0
3 years ago
Other questions:
  • What is the function of a data bus
    11·1 answer
  • Thomas is using a drawing program to complete a construction. Which construction could he be completing? (5 points).
    5·2 answers
  • You are a high school counselor with 9 students who applied for 3 different summer jobs: Job A, Job B, and Job C. Each of the su
    5·1 answer
  • Andrew will use the _____ picture option to add a new image. ??
    15·2 answers
  • _______ Originally , the art of maganing engines; in its modern and extended sense
    7·1 answer
  • What determines the color of a rock?
    11·2 answers
  • Identify a true statement of a JavaScript program in a web form.
    10·1 answer
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • Some of the ways we can resolve IPv4 address shortage
    15·1 answer
  • spreadsheet solution Credit Score Current Rate First Name: Mary 500 6.50% Last Name: Bell 550 6.25% Address: 123 First Street 60
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!