1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
4 years ago
15

In the receiving computer, UDP receives a datagram from the __________ layer.

Computers and Technology
1 answer:
bekas [8.4K]4 years ago
3 0

Answer: The answer is b.

Explanation:

In the OSI model, in the receiving computer, the information flows from the lower layers to the higher layers, starting from the physical layer and finishing in the application layer.

At each layer, it takes place an inverse process to the encapsulation in the transmitting device, i.e. each layer receives the encapsulated packet from the immediate lower layer, takes the header and passes the remaining payload to the higher layer.

For UDP, as a transport layer, it receives the packet (called datagram after stripping the data link layer header)  from the immediate lower layer, the network layer, usually, the IP protocol.

You might be interested in
In one to two sentences, describe how you would insert a row in a spreadsheet.
Over [174]

Answer:

give points pls

Explanation:

7 0
4 years ago
Read 2 more answers
Does anyone know any nitro type hack??
alexgriva [62]

Answer:

yes nitro hack is where they time your hacking skills

5 0
4 years ago
Read 2 more answers
Which are the planning design building and implementation phases considered to be
skelet666 [1.2K]

Answer:

3) benchmarks

Explanation:

Project management can be defined as the process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service. Generally, projects are considered to be temporary because they usually have a start-time and an end-time to complete, execute or implement the project plan.

Benchmarking refers to a process that continuously identifies, understands, and adapts outstanding processes found inside and outside an organization. Well-run organizations compare not only against competitors (where possible) but against best-in-class organizations as well.

This ultimately implies that, benchmarks are used to measure a firm's products, services, or processes performance in comparison with another business firm that are considered or assumed to be the best in that industry.

Hence, the planning, design, building and implementation phases considered to be benchmarks.

6 0
3 years ago
In two to four sentences describe how you would center text?
elena-14-01-66 [18.8K]
You can highlight all of the text you want to center. The next step is to go to the center function in the paragraph tab under the home tab. Or you could just use the keys CTRL and E to center the words highlighted.
4 0
3 years ago
Read 2 more answers
In addition to their full versions, some commercial software is available as a ____ or trial version.
Dimas [21]
Free version also know as the lite version that has less feature and but still allows the user to use the the core functionality
3 0
3 years ago
Other questions:
  • Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, modification,
    15·1 answer
  • The force of impact is____.
    8·2 answers
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb
    12·1 answer
  • Citing the recent increase in earnings by several computer companies, economists feel that a cycle has begun in which personal c
    13·1 answer
  • What limited the possibilities of game development from a technical viewpoint?
    7·1 answer
  • Write a program to read a record from a binary file
    8·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • What is the purpose of flight simulator programs, and what are some of the benefits of using them?
    5·2 answers
  • B. Directions: Fill in the blanks with the correct answer.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!