1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
3 years ago
13

Pick the two statements about packets and routing on the Internet which are true. a. Packets travelling across the Internet take

a standardized amount of time and so can be counted on to arrive in the order they were sent b. TCP ensures messages can be reliably transmitted across the Internet c. TCP depends on the infrastructure of the Internet to be reliable enough to ensure no packets are lost in transmission d. TCP must account for the fact that packets may not arrive at a destination computer in the intended order
Computers and Technology
1 answer:
Cloud [144]3 years ago
8 0

Answer:

B. TCP ensures messages can be reliably transmitted across the Internet.

D. TCP must account for the fact that packets may not arrive at a destination computer in the intended order

Explanation:

TCP or transmission control protocol is a connection oriented protocol that divides a packet to segments, and reliably sends them to their destination.

TCP is a layer 4 (transport layer) protocol in the OSI network model. Its packets data unit, PDU, is called segment.

For TCP connection to be successful, a three way handshake must be established between the client and server.

When a connection is established, tcp sends the packets in sequenced segments to the destination through various routes, the source receives acknowledgement for segments received by the destination and the source resend segment that were lost. In the destination, the TCP arranges the segments to its proper sequence.

You might be interested in
3. Write a program that inputs 4 hexadecimal digits as strings (example 7F), converts the string digits to a long – use strtol(i
never [62]

Answer:

#include <stdio.h>

#include <stdlib.h>

int main()

{

char num1[20],num2[20],num3[20],num4[20];

//Checks where the conversion of string to long stops and is required by strtol

char *ptr;

//Stores the converted number string into long.

long result_num1,result_num2,result_num3,result_num4;

//Prompt to enter all the four hexadecimal numbers.

printf("Enter the first hexadecimal number: ");

scanf("%s",num1);

printf("Enter the second hexadecimal number: ");

scanf("%s",num2);

printf("Enter the third hexadecimal number: ");

scanf("%s",num3);

printf("Enter the fourth hexadecimal number: ");

scanf("%s",num4);

//Converting the hexadecimal numbers into long using strtol() function with base 16 for hexadecimal.

result_num1 = strtol(num1,&ptr,16);

result_num2 = strtol(num2,&ptr,16);

result_num3 = strtol(num3,&ptr,16);

result_num4 = strtol(num4,&ptr,16);

//Casting the long to unsigned chars.

unsigned char numb1 = (unsigned char)result_num1;

unsigned char numb2 = (unsigned char)result_num2;

unsigned char numb3 = (unsigned char)result_num3;

unsigned char numb4 = (unsigned char)result_num4;

//Applying the boolean operation on unsigned chars and storing the resultant value in result.

unsigned char result = ((numb1&numb2)|numb3)^numb4;

//Printing the result in capital hex ("%X" take care of this).

printf("%X",result);

return 0;

}

Code OUTPUT

Enter the first hexadecimal number: 1 Enter the second hexadecimal number:2

Enter the third hexadecimal number: 3 Enter the fourth hexadecimal number: 4 Resultant Value: 7 Process returned o (0×0) execution time : 3.076 s

Press any key to continue

4 0
3 years ago
Wyjaśnij w jaki sposób wykonuje się nitowanie zakładkowe i nakładkowe, oraz wyjaśnij na czym polega pasowanie mieszane.
Ksenya-84 [330]

Answer:

????

Explanation:

i dont speak this language

7 0
3 years ago
Range of motion definition
svet-max [94.6K]
Range of Motion:
Range of Motion or ROM is an exercise machine when a person has been injured in some way, most times the doctor's advises the patients to exercise and stretch the back back muscles. 
<span />
7 0
3 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
4 years ago
Read 2 more answers
The questions are in the pictures, i basically have to create a web page, drop the html code and files below thank you.
matrenka [14]

This contains pretty much what you need:


<!DOCTYPE html>



<html>


<head>


   <meta charset="utf-8" />


   <title>The Page Title</title>


</head>


<body>



   <h1>First paragraph</h1>


   <p>This is a paragraph of text.</p>


   <h2>Second level paragraph</h2>


   <p>


       Here is an unordered list of options:


       <ul>


           <li>First</li>


           <li>Second</li>


           <li>Third</li>


       </ul>


       Here is another unordered list of options:


       <ul>


           <li>First</li>


           <li>Second</li>


           <li>Third</li>


       </ul>


       Here is an ordered list of options:


       <ol>


           <li>First</li>


           <li>Second</li>


           <li>Third</li>


       </ol>


   </p>


   <h4>Third level</h4>



</body>


</html>

3 0
4 years ago
Other questions:
  • What is the purpose of a title slide? A) To add titles to each slide B) To introduce the presentation C) To describe the resolut
    12·2 answers
  • The method header of the equals() method within the string class is ____.
    13·1 answer
  • The ________ defines every object and element on a web page.
    13·1 answer
  • Melissa and Sue want to distribute a document to be discussed at a meeting starting in about thirty minutes. People will be atte
    14·1 answer
  • What is the purpose of an internet protocol address (ip address)?
    5·1 answer
  • Suppose you define a java class as follows: public class test { } in order to compile this program, the source code should be st
    14·1 answer
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • Which of the following is false? Group of answer choices A) A string may include letters, digits, and various special characters
    7·1 answer
  • Define the html code to insert a heading
    14·1 answer
  • Who benefits the most from billing by the second for cloud resources, such as virtual machines?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!