1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
3 years ago
15

A device receives a Transmission Control Protocol (TCP) packet. The device understands where the actual data payload begins. Whi

ch portion of the TCP header provides this information?
1) Data offset

2) Acknowledgement number

3) Checksum

4) Sequence num
Computers and Technology
1 answer:
asambeis [7]3 years ago
5 0

Answer:

The answer is 1. Data offset

Explanation:

From the Question given, a device that receives a Transmission Control Protocol packet and also understands where the actual data payload begins is called the Data Offset

Data offset: This is the 4 bit data offset field, also referred to as the header length. It indicates the length of the TCP header so that we know where the actual data starts from or begins.

You might be interested in
What is the missing line of code to have the following output?
dangina [55]

The missing line of code to have the following output is console log ("\'hi").

<h3>What are codes?</h3>

Codes are the rules in an information system that converts the information such as image, text from communication language to other language that is secret and only can understand by the system.

Thus, the missing line of code to have the following output is console log ("\'hi").

Learn more about codes

brainly.com/question/17293834

#SPJ1

3 0
2 years ago
Consider the following statements: #include #include class Temporary { private: string description; double first; double second;
Anna007 [38]

#include <iostream>  

#include <iomanip>  

using namespace std;  

class temporary  

{  

public:  

void set(string, double, double);  

void print();  

double manipulate ();  

void get (string&, double&, double&);  

void setDescription(string);  

void setFirst(double);  

void setSecond(double);  

string getDescription() const;  

double getFirst () const;  

double getSecond () const;  

temporary(string = "", double = 0.0, double = 0.0);  

private:  

string description;  

double first;  

double second;  

};  

void temporary::set(string a, double dblA, double dblB)  

{  

description = a;  

first = dblA;  

second = dblB;  

}  

void temporary::print()  

{  

cout << "\nDescription: " << left << setw(20) << description << endl <<  

" first: " << fixed << setw(10) << setprecision(2) << first << endl <<  

" second: " << fixed << setw(10) << setprecision(2) << second << endl;  

}  

double temporary::manipulate()  

{  

return first / 3.0 + second / 4.0;  

}  

void temporary::get(string& strDesc, double& dblFirst, double& dblSecond)  

{  

strDesc = description;  

dblFirst = first;  

dblSecond = second;  

}  

temporary::temporary(string d, double a, double b) : description(d), first(a), second(b) {}  

void temporary::setFirst(double dblFirst){first = dblFirst;}  

void temporary::setSecond(double dblSecond){second = dblSecond;}  

void temporary::setDescription(string desc){description = desc;}  

string temporary::getDescription() const {return description;}  

double temporary::getFirst () const{return first;}  

double temporary::getSecond () const {return second;}  

int main()  

{  

cout << "temporary a;";  

temporary a;  

a.print();  

cout << "a.setFirst(3.0): ";  

a.setFirst(3.0);  

a.print();  

cout << "a.setSecond(4.5): ";  

a.setSecond(4.5);  

a.print();  

cout << "a.setDescription(\"Picture Frame\") ";  

a.setDescription("Picture Frame");  

a.print();  

cout << "a.print(): ";  

a.print();  

return 0;  

}

6 0
4 years ago
What can you do to make sure no one outside your company can gain access to its wireless network?
Oksana_A [137]

Disable SSID broadcasting, Lower radio energy groups, and Enable MAC filtering.

<h3>Why would you disable SSID broadcasting?</h3>
  • Disabling the SSID Broadcast is one method of ensuring your wireless web.
  • This procedure will stop other users from detecting your SSID or your wireless network title when they attempt to view the available wireless networks in your area.
  • The network character exists delivered to wireless devices, which is the reason for disabling the SSID broadcast.
  • A typical wireless adapter and its associated software will identify and list all available SSIDs for networks that are within range.
  • When somebody disables SSID broadcast on any of those networks, the network will no extended show up in the wireless adapter's list of known networks.

To learn more about Disable SSID broadcasting, refer to:

brainly.com/question/15289342

#SPJ4

The complete question is:

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.

What can you do to make sure no one outside your company can gain access to its wireless network?

6 0
2 years ago
What blank operating system is usually used in personal computers
LenaWriter [7]

The market of personal computers is dominated by Microsoft with their OS called Windows. Windows 10 and Windows 7 are most popular operating systems.

7 0
3 years ago
Who wants to become friends
Korolek [52]

Answer:

Sure why not

Explanation:

7 0
3 years ago
Other questions:
  • Ou are a web page designer and you set up a page with five different links. a user of the page can click on one of the links or
    10·1 answer
  • ____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
    8·1 answer
  • Care sunt avantajele fișierelor de tip ".pdf" ?
    15·2 answers
  • In c++ when you create a class and you don't want to put the class and the main program in one source file and let's say you cre
    14·1 answer
  • What is the output of the AWK program?
    11·1 answer
  • When can screen tips be useful
    10·2 answers
  • How do operating system work?
    5·1 answer
  • Question #5
    15·2 answers
  • 97. How many bits is a ki obyte?<br> a. 1000<br> b. 1024<br> c. 8192<br> d. 8124<br> 5
    15·2 answers
  • What are the importance of rules in the computer lab ?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!