1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
13

List at least five tasks a layer performs. Could one (or more) of these tasks could be performed by multiple layers?

Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
6 0

Answer:

Transport layer:

- data packets are segment to smaller chunks.

- gives sequence number to segment.

- identifies the source and destination port number.

- initiates data transmission between nodes.

- rearrange and identifies the application, the transmitted data is meant for.

Explanation:

The transport layer is the fourth layer in the OSI network model. Protocols like TCP and UDP are found in this layer. It segment data packets and for a connection oriented protocol like TCP, it creates an established session between source and destination host (the session layer can also do this, but it is more defined in the transport layer).

The network and data-link layer can also transmit data packets.

You might be interested in
He flow of electric charges through a material describes an electric _______.
almond37 [142]

Answer:

Its correct answer is D. Current

The flow of electric charges through a material describes an electric <u>Current.</u>

Explanation:

7 0
4 years ago
Realizaţi un eseu cu titlul Extinderea domeniului de măsurare la ampermetre
Studentka2010 [4]
What do you need help with ???????
8 0
4 years ago
Which business application uses location information to provide a service and is designed to give mobile users instant access to
statuscvo [17]

Answer:

The correct answer to the following question will be "Location-based services".

Explanation:

Location-based services are resources that are delivered via a cell phone to take into consideration the geographical location of just the user. It usually include entertainment or data.

  • This uses the technology of GPS from a smartphone to detect the location or the position of an individual if that individual has expressed a preference-in to enable the service to do just that.
  • The app will classify its search down to a physical address during a smartphone user chooses-in, without any need for automatic input of the data.

Therefore, it's the right answer.

3 0
3 years ago
Who here would like to play among us with me? <br> Time: Friday, November 13
Ira Lisetskai [31]

Answer:

BRO I WANNA!

My among us name is "A cop"

What time?

Explanation:

8 0
3 years ago
High-level languages must be translated into machine language before they can be executed. _________________________
Rufina [12.5K]
High-level language programs must be translated into machine language before they can be executed. (Machine language instructions are encoded as binary numbers that are meant to be used by a machine, not read or written by people. The Java compiler translates Java programs into a language called Java bytecode.
4 0
3 years ago
Other questions:
  • Where is the typical location of a touchpad inside of a laptop?
    14·1 answer
  • Create short names for the terms below based on the naming conventions rules.
    14·1 answer
  • Hannah had been a newspaper carrier for four years. Each year she delivered more papers then the year before. The first year she
    13·1 answer
  • The rules that determine what is allowed in a program are known as the
    14·1 answer
  • The _______ is the continuing development of the internet that allows everyday objects embedded with electronic devices to send
    11·1 answer
  • Linux is a kind of software whose code is provided for use, modification, and redistribution. what kind of software is this?
    5·1 answer
  • While num_printed != num_stars: print('*') Sample output with input: 3 * * *
    15·1 answer
  • On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!
    10·1 answer
  • Fast i need now ill give anything
    13·2 answers
  • Electronic hacking and illegal trespassing for the purposes of acquiring a competitor’s proprietary information is considered.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!