1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
4 years ago
7

The term ___________ means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers

and does its best to get a transmission through to its destination, but with no guarantees
Computers and Technology
1 answer:
snow_tiger [21]4 years ago
7 0

Answer:  "Best-Effort"

Explanation: The IP protocol is neither responsible for delivering packets to destination nor those packets arrive in the same order than they were transmitted, i.e., does the "Best Effort", that's all.

These functions are responsibility of the transport layer, like TCP in the TCP/IP Suite.

You might be interested in
Define computer architecture?
tia_tia [17]

Answer:

computer architecture is a set of rules and methods that describe the functionality, organization, and implementation of computer systems. The architecture of a system refers to its structure in terms of separately specified components of that system and their interrelationships.

4 0
2 years ago
Write a program that will read in a line of text and output the number of words in the line and the number of occurrences of eac
kherson [118]

Answer:

Here is the C++ program:

#include<iostream>  //to use input output functions

#include <algorithm>  //to use tolower() function

using namespace std;  //to identify objects like cin cout

int main() {  //start of main function

 string text;  // to hold text input

 cout<<"Enter a line of text: ";  // prompts user to enter a string

 getline(cin,text);  // reads the input string (text) from user

transform(text.begin(), text.end(), text.begin(), ::tolower);  //converts the text into lower case

 int letter[26] = {0}; //to hold the letters

 int i;  // used as a loop variable

 int words=0;  // to hold the count of words

 for(i = 0; i< text.size();i++){  // iterates through the text

 if(isalpha(text[i])&&(text[i+1]=='.'||text[i+1]==','||text[i+1]==' '))  //checks if the character at i-th index of text is a letter, and checks if i+1 index position of text is a period, comma or a space

 words++;  // adds 1 to the count of words

 if(isalpha(text[i]))  // if the character at the i-th index of text is a letter

 letter[text[i]-'a']++;  }  // counts the occurrences of each letter

 char j = text[text.size()-1];  // sets j to the last character of text

 if(j != '.' && j!= ' '&& j!=',' &&j!= '\0')  //if the last character is not a period or empty space  or comma or end of lone

 words++;  //add 1 to the count of words

 cout<<"Number of words: "<<words<<endl;  //display the number of words in the text

 for(i=0; i<26; i++)  {  //iterates 25 times

   if(letter[i]>0)  //if letter at index i is greater than 0

   cout<<(char)('a'+i)<<" : "<<letter[i]<<endl;  }} //displays each letters and its number of occurrences in the text

 

Explanation:

The program is explained in the attached document with an example.

7 0
4 years ago
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by usi
monitta

Answer: True

Explanation: I would know i have gotten dosed plenty of times on video games

4 0
3 years ago
Read 2 more answers
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
svetoff [14.1K]

Answer:

Session hijacking

Explanation:

Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

5 0
3 years ago
Joe just joined a new team at his marketing firm, which has been working on a campaign ad for the new Elmo doll. Everyone in the
barxatty [35]

Answer: ask someone to show or explain the doll to him

Explanation:

edmentum

3 0
3 years ago
Other questions:
  • Which of the following is a collection of honeypots used to present an attacker aneven more realistic attack environment?a. Padd
    6·1 answer
  • A/an ___________ is a scheduling tool that sets the standard and nonworking time for the project and is used to assess how tasks
    6·1 answer
  • Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
    10·1 answer
  • Explain word processing ​
    11·2 answers
  • 10.7 LAB: Fat-burning heart rate Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus th
    8·1 answer
  • What is the primary responsibility of the federal reserve bank??
    11·1 answer
  • The term "exception propagation" means:
    5·1 answer
  • When your hands are on home row, your left hand rests lightly on _____. J K L ; A S D F Z X C V Q W E R'
    11·1 answer
  • Pls help... : Slide layouts can be changed by _____.
    9·1 answer
  • Write if true or false
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!