1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
3 years ago
10

The Transmission Control Protocol (TCP) splits each message into multiple packets. It's possible for packets from the same messa

ge to arrive out of order.Which field in the IP packet helps computers put the packets in the original order?
Computers and Technology
1 answer:
BARSIC [14]3 years ago
5 0

Answer:

The header file

Explanation:

The 'header' of a packet contains two important information about the data being sent over a network,  number indicating the ordering of all the packets (This ensures that the packets are re-ordered corrected upon arrival at the destination). and information about the total number of packets that the data has been split into, this helps at the destination to know if all packets has arrived, or delayed or lost

You might be interested in
Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
Snowcat [4.5K]

Answer:

b. Synchronous replication

Explanation:

Replication of data in storage partitions or in a number redundant array of independent disk drives helps to promote redundancy, as implied, and faulty tolerance to reduce loss of data.

There are two categories of replication and they are synchronous and asynchronous replication.

Synchronous replication requires low latency network site to mirror data, while asynchronous replication mirrors data in large metropolitan area in high latency networks.

4 0
2 years ago
Help to how to write pseudo code to insert a new node to Binary Search Tree. Using C++.
dimulka [17.4K]

Answer:

Let the function be Node* ins(Node *root,int k)

if root node is NULL then return new node with data equal to k.

If the k <root->data

root->left=ins(root->left,k);

else if k >root->data

root->right =ins(root->right,k);

At last return root.

Explanation:

Node is always inserted at the at the leaf node.We will search k in the tree if we hit a the leaf node the new node is inserted as the child of the leaf node.

4 0
2 years ago
Curtis has been testing a new software package for the past two months. However, he decides not to switch and goes back to using
hodyreva [135]
Retro-active interference
8 0
3 years ago
Ethereum Mining Calculator Profitability and Difficulty Level?
yanalaym [24]

Profitability Calculator: https://www.cryptocompare.com/mining/calculator/eth?HashingPower=200&HashingUnit=MH%2Fs&PowerConsumption=140&CostPerkWh=0.12&MiningPoolFee=1

Difficulty Level Chart: https://www.coinwarz.com/difficulty-charts/ethereum-difficulty-chart

3 0
3 years ago
Which of these is NOT one of the main parts of an email? A. Header B. Subject C. Body D. Reply
7nadin3 [17]
D. Reply.
<u><em>Brainiest PLEASE!
</em></u>

7 0
3 years ago
Read 2 more answers
Other questions:
  • I want to work on cloud computing and i need some help on how to start ?
    6·1 answer
  • What is the order in which windows systems receiving and process multiple gpos?
    7·1 answer
  • "The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
    11·1 answer
  • each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
    14·1 answer
  • The physical parts of the computer that you can see and touch are called______.
    5·1 answer
  • A mobile device user has tried to install a new app numerous times without success. She hasclosed all unused apps, disabled live
    12·1 answer
  • If you entered data into row 4 and it should be in row 3, you should _____.
    8·2 answers
  • Consider a disk that rotates at 3600 rpm. The seek time to move the head between adjacent tracks is 2 ms. There are 32 sectors p
    5·1 answer
  • Most C++ catastrophe vulnerabilities rely on uninitialized function pointers in a class.
    13·1 answer
  • What is phishing?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!