Answer:
Host A and B directly connected to Mbps link.they receive buffer to fill up the fact that Host A will sending in Mbps data faster than B removing the data from it.Once buffer has filled.Host B send a message to Host A to stop sending data then Host B sending a TCP to Host A.Then buffer will fill up again and this process will repeat.
Answer:
32
Explanation:
Total bits will be 32 only as address is of 32 bits
(meaning to ask the size of the cache)
The most serious security threat to Bluetooth-enabled devices is
, which occurs when a hacker gains access to the device and its functions without the owner's consent.

The Feature that can control left and right indents on using markers is Ruler. The indent marker consists of two triangles and a rectangle. <span>To change the left indent, click on the very bottom of the indent marker, the rectangle, and drag it to a new position.</span> <span>The Right Indent is indicated by a single triangle on the Ruler at the current right margin. Click and drag it to change the margin.</span>
Answer:
Spoofing
Explanation:
Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source