1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
15

What could be one possible reason where the recipient is not guaranteed that the data being streamed will not get interrupted?

Computers and Technology
1 answer:
anyanavicka [17]3 years ago
3 0

Answer

The senders PC is using UDP protocol

Explanation

UDP is the User Datagram Protocol which is used as an alternative communication protocol to the TCP which is used primarily for establishing low latency and loss of tolerating connections between applications on the internet UDP is normally used by the programs running on different computers on a network. Its purposes is to send short messages which are datagrams. It is not much reliable because of its occasional loss of packet. Due to this packet loss  the recipient is not guaranteed that the data being streamed will not get interrupted. This is because If a router on the Internet starts getting overloaded, or a packet gets corrupted due to interference or anything, the packet will be dropped unlike the TCP (Transmission control  protocol)which resend the packets and keeps re sending. The UDP does not resend the packets which are dropped. Once they are dropped that all.


You might be interested in
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
3 years ago
If a movie starts at 305 and the movie is 2 hrs and 44 mins when does the movie end?
AURORKA [14]
3 : 05 + 2 : 44 = 5 : 49 

.......................................  
4 0
3 years ago
Why do mosquitoes lay eggs in water​
d1i1m1o1n [39]

Answer: Some species of mosquitoes lay their eggs on water or on vegetation very near to water because their larval instars are aquatic. Thus, when the eggs hatch the first instar larvae will already be in the larval media. Some species of Aedes mosquitoes lay their drought resistant eggs on the soil of dried up playa lake beds. When it rains, the moisture will serve as a hatching stimulus and the eggs will hatch and spend their larval instars in the pools of rainfall. Other mosquito female will lay their eggs in the water of plant axils, tree holes and related plant habitats. In each of these instances, the immature mosquito instars require water in larval development and molt into adult insects.

hope it helps you

3 0
3 years ago
Read 2 more answers
All software, services and protocols not required by the system or necessary being disabled or not installed is called:____.
mihalych1998 [28]

Answer: Minimization

Explanation:

All the software, services and protocols

that's not required by the system or necessary being disabled or not installed is referred to as minimization

Minimization simply has to do with the uninstalling of the software that's useless and that's not using up the protocols as well.

Therefore, the correct option is D.

8 0
3 years ago
Which of the following best describes the protocols used on the Internet?
Cerrena [4.2K]

Answer: No it is D.

D: The protocols of the Internet are open and used by all devices connected to the network

Explanation:

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

3 0
3 years ago
Other questions:
  • how do you set up a slide show to play continuously, advancing through all slides without requiring your interaction? A. Click S
    9·1 answer
  • What would 128 kbps look like on a phone? i.e. 4g, 3g, 2g, etc
    9·1 answer
  • You can tell when an image is selected, because its sizing handles will be visible. True or False
    15·2 answers
  • Which statement reflects inherent bias in reading and learning about our world?
    12·1 answer
  • Which category best represents: a student sends harassing emails to another student. The receiving student retaliates with a "fl
    10·2 answers
  • The following numbers are sorted in which way: 10, 20, 30, 40? A. ascending B. descending C. shuffled
    7·2 answers
  • You have a chart that shows 100 data points and you've circled the highest value. Which of the following are you using?
    8·1 answer
  • Select the correct answer.
    12·2 answers
  • Conceptual note-taking is the act of writing down information in the order it is given. drawing attention to details with a mark
    8·2 answers
  • P*********** is considered a serious social problem justify this statement​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!