1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
6

What layer uses the UDP protocol

Computers and Technology
1 answer:
Anton [14]3 years ago
6 0

The layer that uses the UDP protocol is : Session Layer.  The session layer creates a session between the source and the destination nodes and ends the sessions on completion of the communication process.

You might be interested in
Why might a peer-to-peer network not be the best choice for a large corporate office setting?
omeli [17]

Answer:

a it is less private

Explanation:

8 0
4 years ago
Write a C++ function with the following signature: void readAndConvert() The function takes no parameters and returns no value.
shepuryov [24]

Answer:

The function is as follows:

void readAndConvert(){

   int n; string symbol,name;

   cin>>n;

   cin>>symbol;

   cin.ignore();

   getline (cin,name);

   vector<string> trades;

   string trade;

   for (int inps = 0; inps < n; inps++){

       getline (cin,trade);

       trades.push_back(trade);}

   

   cout<<name<<" ("<<symbol<<")"<<endl;

   for (int itr = 0; itr < n; itr++){

       string splittrade[3];        int k = 0;

       for(int j=0;j<trades.at(itr).length();j++){

           splittrade[k] += trades.at(itr)[j];

           if(trades.at(itr)[j] == ' '){

               k++;    }}

cout<<splittrade[2]<<": "<<floor(stod(splittrade[1]) * stod(splittrade[0]))<<endl;        }

   }

Explanation:

See attachment for complete program where comments are used to explain each line

Download cpp
4 0
3 years ago
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software c
GalinKa [24]

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. <u>VPN </u> software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

Explanation:

  • A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet.
  • VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more. .
  • Virtual Private Network, is a private network that encrypts and transmits data while it travels from one place to another on the internet. VPNs aren't just for desktops or laptops, you can set up a VPN on your iPhone, iPad or Android phone.
  • A VPN encrypts the traffic from your machine to the exit point of the VPN network. A VPN isn't therefore likely to protect you from an adversary like Anonymous.
  • VPNs add another layer of encryption to your internet traffic, your latency will go up and speeds will go down.

3 0
4 years ago
Data silos are often associated with ________________.
amid [387]

Answer:

Option b the development of one or a few related analytics applications.

Explanation:

Data silo is the isolated information in an organization which is not shared across different departments. Data silo could exist because one department in an organization may not see the necessity to share information to other department. Or the information is deemed as unique data which is dedicated  to develop one or a few very specific analytics applications.  Data silos should be minimized if an organization intends to develop a data analytics system that support in enterprise wide level.

7 0
3 years ago
What is a attack vector<br>​
kogti [31]

Answer: A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect a computer. This sense is similar to, and derived from, its meaning in biology

Explanation:

give me a Brainliest

3 0
3 years ago
Other questions:
  • 1. Jesse wants a recommendation about creating an SCR help desk. She said that I can find lots of information about help desks o
    7·1 answer
  • What two images did you have to add to the wds server to handle the windows installation?
    7·1 answer
  • Which of the following is not an impact device?<br> Joy Stick<br> Track Ball<br> Mouse<br> Printer
    10·1 answer
  • With network management software, a network manager can ____.
    6·1 answer
  • Which of these is a requirement for developing game applications on devices running Apple’s iOS operating system?
    6·2 answers
  • A file with a com extension is most likely to be a(n) ___ file.
    13·2 answers
  • Apps are designed by___.
    11·2 answers
  • Describe all the steps a router goes through while deciding where to send the a packet. Explain why a router would choose one ro
    7·1 answer
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
  • What is the "Driver's Compact Law"?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!