1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
14

Host A is sending Host B a large le over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknow

ledgments to Host A because Host B cannot piggyback the acknowledgments on data.a. Trueb. False
Computers and Technology
1 answer:
mestny [16]3 years ago
3 0

Answer:

False.

Explanation:

Piggybacking is an optimization that is used when both sides have to send data to each

other so that the receiver, instead of sending two packets i.e., an ACK and a data packet, it just sends one.

When the receiver (B) does not have any data to send, it will still send an ACK with the sequence number

field containing the next sequence of data it is supposed to send

You might be interested in
Write a program using integers user_num and x as input, and output user_num divided by x three times. Ex: If the input is: 2000
tankabanditka [31]

Answer:

The program written in Python is as follows:

<em>user_num = int(input("Number: ")) </em>

<em>x = int(input("x: ")) </em>

<em>for i in range(1,4): </em>

<em>      user_num = user_num/x </em>

<em>      print(user_num," ")</em>

Explanation:

This line gets user_input from the user

<em>user_num = int(input("Number: ")) </em>

<em />

This line gets x from the user

<em>x = int(input("x: ")) </em>

<em />

This line iterates from 1 to 3

<em>for i in range(1,4): </em>

This line divides user_num by x

<em>      user_num = user_num/x </em>

<em />

This line prints the result of the division

<em>      print(user_num," ")</em>

7 0
4 years ago
What are three ways digital identity is created and kept up? (open answer)
Anna007 [38]

Answer:

Capture attributes as ID documents or biometric data

Explanation:

Examples of such attributes include biometrics, verified identification documents, and third-party verification procedures. To create a trusted digital ID, there are typically three steps: capturing verified attributes, verification of the documents, and digitization of the ID.

Great day :) toodles

6 0
3 years ago
​​most code division multiple access (cdma) networks conform to ____________ , created by the telecommunications industry associ
Lyrx [107]
The answer is <span>IS-95.  M</span><span>ost Code Division Multiple Access (CDMA) networks conform to IS-95, created by the Telecommunications Industry Association (TIA).  I</span><span>nterim Standard </span>95<span> (</span>IS-95<span>) was the first ever CDMA-based digital cellular technology, developed by Qualcomm and later adopted as a standard by the Telecommunications Industry Association (TIA).</span>
3 0
4 years ago
Name the different payment systems the shophive.com isusing?
olganol [36]

Answer:

 Different payment systems the shophive.com is using are that everyone has the different feasibility and some users are comfortable with credit cards, debit cards while some users are comfortable with cash on delivery. Shophive brings the best opportunity for customers to experience the best online shopping in Pakistan. Unlike other online shopping website in Pakistan, shophive do not pressurize our customers.  As they provide customers with the freedom of choice and the flexibility so, that they live up their dreams.

4 0
3 years ago
Utility software can help you to
Allushta [10]
Utility software can help you to designed to help analyze,configure , optimize  or maintain a computer.
6 0
3 years ago
Other questions:
  • PLEASE HELP
    9·2 answers
  • Consider the following class declaration.
    6·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • What is a benefit of using a client/server network?
    7·1 answer
  • Need help asap
    5·1 answer
  • Write a 200 word essay about how a computer is made.<br><br>Good luck.​
    9·1 answer
  • Convert Fahrenheit to Celsius using this formula: F = (9/5)*C+32
    5·1 answer
  • Name any five application or uses of smartphone and computer.<br>​
    8·1 answer
  • Irma bought a gaming computer at Bestbuy 3 years ago and it’s been on ever since. Her computer is staring to feel unstable and a
    10·1 answer
  • A mobile phone app asks the user to point the phone's camera at a room and then applies the phone's LIDAR scanning function. Wha
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!