1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
8

The entirety of a packet at one layer becoming the payload section at another layer is known as

Computers and Technology
2 answers:
marusya05 [52]3 years ago
8 0
The best answer to this question would be encapsulation

Payload data is part of a packet that is within a TCP or a UDP. It is the actual or essential data that is being carried within a packet. For instance, a layer 2 Frame has a payload of a layer 3 packet and a layer packet has a payload of layer 4 Segment. This simply can be called encapsulation. Each layer in the examples mentioned builds a PDU by adding a header containing control information to the PDU.  



-BARSIC- [3]3 years ago
3 0

Answer:

The entirety of a packet at one Layer becoming the payload section at another is know as <u>Encapsulation</u>

<u>Explanation:</u>

Encapsulation can be defined  as a strategy for planning secluded correspondence conventions in which sensibly separate capacities in the system are disconnected from their basic structures by incorporation or data covering up inside more elevated amount objects.

You might be interested in
3.5 Lesson practice quiz: Edhesive Question 5
Fed [463]

Answer:

There is an error, the else should be after the elif

Explanation:

5 0
2 years ago
how to write a function "void funct()" which will accept a string from the user as input and will then display the string backwa
Mariulka [41]

Answer:

#include <bits/stdc++.h>

using namespace std;

void funct(){

   string name;

   cout<<"enter the string: ";

   cin>>name;

   

    reverse(name.begin(), name.end());

    cout<<"The string is : "<<name<<endl;

   

}

int main()

{

   funct();

 

  return 0;

}

Explanation:

create the function funct() with return type void and declare the variable type string and print a message for asking to used enter the string.  

The string enter by user is store in the variable using cin instruction.

after that, we use a inbuilt function reverse() which takes two argument.

firs argument tell the starting point and second index tell the ending point. then, the reverse function reverse the string.

name.begin() it is a function which return the pointer of first character of string.

name.end()  it is a function which return the pointer of last character of the string.

finally, print the reverse string.

for calling the function, we have to create the main function and then call the function.

5 0
3 years ago
Which game would be classified as an educational game
Masja [62]

Answer:

The various game types can be like board, video and card games. As far as educational video games are concerned they are made to explain to us some of the subjects which can be specific, as well as to teach a certain set of skills like role-playing. They are the interactive play that can help us learn the rules, goals, techniques to solve the problems. adaptation quality, as well as interactions, and all of these are being narrated in the form of a story. You should know that each game is a story in reality, and always. One can think of many such games, and like action games based on the military helps us learn how to fight a war.

Explanation:

Please check the answer.

7 0
3 years ago
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
erica [24]

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>

8 0
2 years ago
Read the excerpt from The Common Sense of Bicycling: Bicycling for Ladies. To learn to balance, have the saddle raised as high a
kirill [66]

The answer is adjusting the seat.

3 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-ave
    14·1 answer
  • ________ is the application of statistical techniques to find patterns and relationships among data for classification and predi
    14·1 answer
  • This is an electronic method used to send and receive data–voice, text, images, and video.
    13·2 answers
  • Explain the history of computing of mechanical era
    14·2 answers
  • ___________________ are aggregated collections of memory and cpu resources that can be shared among groups of virtual machines o
    11·1 answer
  • Joann wants to insert page numbers at the bottom of the pages of her document using the Field option in Quick
    12·2 answers
  • The Internet began when a large company wanted to sell products online. <br> True or flase?
    6·2 answers
  • Explain the functions of a VDU?
    6·1 answer
  • Limitations of systems analysis and design​
    13·1 answer
  • ANs and WANs can be set up in several different shapes, also known as peripherals.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!