1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
11

Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form compl

ete messages?
Computers and Technology
1 answer:
Ratling [72]3 years ago
8 0

Answer:

Transmission Control Protocol (TCP)

Explanation:

On the network architecture for connecting to the internet, the output intended to be sent over the internet by an application are split into packets and pushed for delivery by one of two protocols; TCP or User Datagram Protocol

These protocols are also responsible for taking the messages contained in the packets for onward delivery to the relevant application via ports

However, TCP gathers and arranges the received packets in the correct order as the originally sent message as well as requesting the retransmission of packets that are damaged or lost from the sending server so as to include their payloads in order to complete the original message.

You might be interested in
Is MongoDB open source?
s2008m [1.1K]

Answer:

Yes

Explanation:

Check MongoDB on Github and you will see that it is open source.

7 0
3 years ago
Consider the following code segment. int j = 10; int k = 8; j += 2; k += j; System.out.print(j); System.out.print(" "); System.o
lubasha [3.4K]

Answer:

Following are the output of the given code:

Output:

12 20

Explanation:

Description of the code:

  • In the java program code, two integer variable "j and k" is defined, that stores a value, that is "10 and 8", in its respective variable.
  • After storing the value it uses the "j and k" variable, in this, it increments the value of j with 2, and in the k variable, it adds the value of j and stores the value in k.
  • After incrementing the value, the print method is used that prints the value of "j and k", i.e, "12 and 20".
8 0
3 years ago
Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b.
Assoli18 [71]

Information should be cross-checked to ensure more than one source provides the same factual information.

<h3>What is the source of information?</h3>

The source of information is the place, from where the data or information is generated. There are many sources of information, like internet, newspaper, television etc.

The options given in the problem regarding the information as,

  • a. repeated
  • b. cross-examined
  • c. cross-lined
  • d. cross-checked

There are many feck news and nonfactual data is present over the internet and other source of information.

To get the factual information, one should always cross-checked the information from other sources.

Thus, the information should be cross-checked to ensure more than one source provides the same factual information.

Learn more about the source of information here;

brainly.com/question/26169752

7 0
2 years ago
Write the definition of a function named alternator that receives no parameters and returns true the first time it is invoked, r
Nataly [62]

Answer:

The solution code is written in C++

  1. bool STATUS = true;
  2. bool alternator ()
  3. {
  4.    if(STATUS){
  5.        STATUS = false;
  6.        return true;
  7.    }else{
  8.        STATUS = true;
  9.        return false;
  10.    }
  11. }

Explanation:

We need a global variable to track the status of true or false (Line 1).

Next, create the function alternator (Line 2) and then check if current status is true, set the status to false but return the previous status boolean value (Line 5-6). At the first time of function invocation, it will return true.

The else block will set the STATUS to true and return the false (Line 7-9).

3 0
3 years ago
A lead views a specific page on your website, say, your case study page. You then send targeted follow-up content like one of yo
IRINA_888 [86]

Answer:

Behavioral Email                                

Explanation:

A behavioral email is an automated email which is sent to recipients on the basis of their behavior. These emails are sent after a user communicates with a business on social media, the company’s website, email, and other communication medium. Behavioral emails help to grow customer involvement and sales. Behavioral email can also be used as a marketing strategy, used by marketers to gather data about an email subscriber in order to send targeted content to that subscriber on the basis of his behavior or actions. When the marketer sends an email to the customer, it is appropriate for that customer, based on the data gathered and their current monitored behavior. Behavioral email helps to understand costumer needs. It helps to get an idea of a customers preferences by inspecting his behavior.

5 0
3 years ago
Other questions:
  • Explain the history of computing of mechanical era
    14·2 answers
  • (BRAINLIEST QUESTION) What are some challenges that will need to be overcome in order for the Internet of Vehicles to become a r
    13·1 answer
  • An ISP is considering adding additional redundant connections to its network. Which of
    5·1 answer
  • DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
    12·1 answer
  • How do you determine which type of operating system that best supports your computer or mobile device?
    5·1 answer
  • List three differences between word and excel
    8·1 answer
  • 3. Touch screens are both input and output devices. Describe one application where a touch screen is used as an output device. (
    7·2 answers
  • In Python, how would you print the first 4 characters of "Help me pass!"
    8·1 answer
  • A write the result P*=++j where j is 24
    5·1 answer
  • An intruder with malicious intent breaks into an office and steals a hard drive
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!