1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
2 years ago
11

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Computers and Technology
1 answer:
Rina8888 [55]2 years ago
7 0

Answer:

a. Checksum

Explanation:

Based on the information provided within the question it can be said that the field that represents this information is called the Checksum. Like mentioned in the question this refers to a value that represents the amount of bits in a certain transmission message. This is done in order to make sure that the amount of bits that were sent match the amount that were received in order to make sure that no data was lost in transit that would cause high-level errors.

You might be interested in
What is the difference between front-end and back-end?
IgorLugansk [536]

Front-end the part with which the user interacts.

usually people who write this are called layout designers what languages ​​are used (Html, css, js)

Beck-end The northern part is the structure of the site due to which it works, this includes the DBMS, logic, etc. which languages ​​will be used(python, php, java)

People who can do both are called: full stack developr

3 0
2 years ago
How can i fix this, if i log in my acc it keeps saying wrong nickname or pass. even though my email and pass is correct
Oksanka [162]

Answer:

미안해요. 나는 우리가 단지 부동일 중 하나를 모르지만 그것을 해결하는 방법을 모른다!.

8 0
2 years ago
Don't Answer If You Are Going To Give Me a Link! DON'T WASTE MY POINTS!
dimulka [17.4K]

Answer:

B but don't be surprised if it is not the answer given.  It's just the best of a bunch of poor choices.

Explanation:

This is actually not an easy question to answer. It's one of those answers that has elements of "Some do and Some don't" in them.

A:  is not true for painters and it is not necessarily true for C for painters.

D: photographer can pose his subjects. A painter can pose someone, but not always.

C: Answered under A.

I think the answer you are forced to choose is B, but neither one has to do it. Still life painters ( a bowl of fruit, a bouquet of flowers) and photographs pose the subjects carefully and do not want the fruit or flowers to move around.

I'd pick B, but it does not have to be the answer. I just think it is less wrong than the others.

5 0
3 years ago
Reusable modules, which are represented in the structure chart as rectangles with vertical lines on both sides, may often appear
Molodets [167]

Answer:

The answer to this question is the option "A".

Explanation:

In this question, the answer is option "A" which is the library. The term library stands in programming language for library made available across implementations of a programming language. In the programming section library is a collection of pre-compiled modules that a program can use and modules are stored in object format. We can reuse these modules in our program. So the answer to this question is the library.

8 0
2 years ago
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
Other questions:
  • Creating calendar events prevents individuals from being able to schedule a time to collaborate.
    11·1 answer
  • A variable must have its type declared but it is not required to be initialized prior to first use.
    12·1 answer
  • When it comes to safety, the choice to be safe is often up to __________?
    8·1 answer
  • Which line is not a computer-generated forecast?Which line is not a computer-generated forecast?the black line representing 20th
    12·1 answer
  • Complete the sentence to identify advantages of top-down programming design. Choose all that apply.
    15·2 answers
  • __________ are the first line of defense against unsafe drivers.
    5·1 answer
  • MULTI SELECTION
    9·1 answer
  • How do you check to see if the user entered more than one character? Complete the code.
    14·1 answer
  • The use of a concept or product from one technology to solve a problem in an unrelated one
    11·1 answer
  • Were is the hype house
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!