1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
11

Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form compl

ete messages?
Computers and Technology
1 answer:
Ratling [72]3 years ago
8 0

Answer:

Transmission Control Protocol (TCP)

Explanation:

On the network architecture for connecting to the internet, the output intended to be sent over the internet by an application are split into packets and pushed for delivery by one of two protocols; TCP or User Datagram Protocol

These protocols are also responsible for taking the messages contained in the packets for onward delivery to the relevant application via ports

However, TCP gathers and arranges the received packets in the correct order as the originally sent message as well as requesting the retransmission of packets that are damaged or lost from the sending server so as to include their payloads in order to complete the original message.

You might be interested in
Can you please provide sample rexx code?
Aleks04 [339]

Answer:

/*  My first REXX program  */

say 'Hello world'

Explanation:

REXX is an OS/2 scripting language.

7 0
3 years ago
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
"When using BitLocker on a laptop, the laptop should not use standby mode, rather it should use hibernate mode. This is because
Harman [31]

Answer:

This statement is false.

Explanation:

The correct statement should read:

"When using BitLocker on a laptop, the laptop should not use standby mode, rather it should use hibernate mode. This is because Hibernate writes memory to the computer’s disk drive, ****which means the contents of the computer's memory are protected by Bitlocker.****

Standby mode (which is basically putting the computer to sleep) keeps the computer in a very low power state, and memory is maintained and not protected by BitLocker."

Hope this Helps.

6 0
4 years ago
. List down mental health problems that may arises with excessive use of digital social networking Do we ever need to be concern
Snowcat [4.5K]

Answer:

Excessive utilization of digital instant messaging could perhaps lead to numerous mental health conditions.

Explanation:

  • The massive pressure just to preserve a privileged lifestyle the same as peer group and other such influencers.
  • Cyberbullying would also be a key component of the social mainstream press. This might cause stress.

Yes, researchers undoubtedly need to worry about who becomes familiar with the internet. There's a whole number of news items living with the effects of over-using social networking sites. There seemed to be headlines that a teen must have been strongly affected by someone with a man as well as ransacked with real money by encouraging them to stay married to her.

8 0
3 years ago
I need help 40 points and brainless
marta [7]

Answer:

the answer is 50

Explanation:

hope that helped

3 0
3 years ago
Other questions:
  • Have main create two objects: setA and setB.Input the values into setA (end with a 0 or negative) and input the values into setB
    12·1 answer
  • 14. What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • Which software would you use to create a print design?
    8·2 answers
  • Look at the following HTML form. Which description is correct? Please enter your discount code:
    13·1 answer
  • The space between the margin<br> and start<br> of paragraph is called
    8·1 answer
  • Where can you get information on receiving financial help?
    12·1 answer
  • Bits of information are combined into meaningful units so that more information can be held in short-term memory through the pro
    5·1 answer
  • Online banking is a convenience that mostly affects which area of your life?
    15·1 answer
  • Define computer architecture?
    10·1 answer
  • QUESTION 9
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!