1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
QveST [7]
4 years ago
9

Assume that messages sent between two programs can be lost, duplicated, delayed, or delivered out of order. Design a protocol th

at reliably allows the two programs to agree to communicate. Give your design to someone, and see if they can find a sequence of loss, duplication, and delay that makes the protocol fail.
Computers and Technology
1 answer:
vichka [17]4 years ago
7 0

Answer:

TCP/IP is the best choice.

Explanation:

You might be interested in
Which area would a Gaming Designer fall under? Research and explain why you think so. Make sure to site your source and where yo
pshichka [43]

Answer: Game Artist, Game Designer or Game Programmer.

Explanation:

All of which fall under a “Game Designer”

5 0
3 years ago
A device that allows multiple computers to communicate with each other is
Lapatulllka [165]

Answer:

A device that allows multiple computers to communicate with each other is

Network Hub.

Hope this helps!

:)

4 0
3 years ago
You begin your first day of responsibilities by examining the recent IS security breach at GearUp to get ideas for safeguards yo
pentagon [3]

Answer:

Sniffing is the correct answer to the given question .

Explanation:

The main objective of Sniffing is to leads and stealing the information interception by detecting the network activity this activity is done by the Sniffing process .When the information is sent through the networks, the information inside the data packet can be detected  by using a sniffer .The sniffer is used in sniffing process.Information is accessed  by the sniffer because the information packets that are sent in the network  are not secured.

By using the Sniffing technique the hackers hacked the company's improperly-secured wireless network and stole customers ' credit card details as well as employee social security numbers.

6 0
4 years ago
Write an algorithm that describes the second part of the process of making change (counting out the coins and bills).
Alenkasestr [34]

An Algorithm that describes the second part of the process can be written as listed below :

<h3>Algorithm describing the second part of the process of making change (counting out the coins and bills ) </h3>

<u>First step</u> : Initialize the required variables to zero to determine the number of coins and bills.

<u>Second step</u> : Prompt and read the amount to convert. amount to Hundreds

<u>Third step</u> : Compute hundred bill note as 100 amount equal to  ( amount% * 100 fifties - amount )

<u>Fourth step </u>: Compute fifty bill notes as :  ( amount% * 50 fifty bill notes )

<u>Fifth Step</u> : Compute Twenty bill notes as amount equal to ( amount% *20 Twenties - amount )

<u>Sixth Step</u> : Compute Tens bill notes as : ( amount% * 10 Tens bill notes )

<em>Note : continue the process for fives, Quarters, Dimes, Nickels, and Pennies. </em>

<em />

Learn more about Algorithm : brainly.com/question/13800096

#SPJ1

<u>Attached below is the missing part of the question </u>

<em>Write an algorithm that describes the second part of the process of making change (counting...</em>

3 0
2 years ago
Write a function gcd in assembly language, which takes two parameters, calculates and returns the gcd of those two numbers. You
Inga [223]

Answer:

Explanation:

The following is written in Java. It creates the function that takes in two int values to calculate the gcd. It includes step by step comments and prints the gcd value to the console.

       public static void calculateGCD(int x, int y) {

           //x and y are the numbers to find the GCF which is needed first

           x = 12;

           y = 8;

           int gcd = 1;

           //loop through from 1 to the smallest of both numbers

           for(int i = 1; i <= x && i <= y; i++)

           {

               //returns true if both conditions are satisfied

               if(x%i==0 && y%i==0)

                   //once we have both values as true we store i as the greatest common denominator

                   gcd = i;

           }

           //prints the gcd

           System.out.printf("GCD of " + x + " and " + y + " is: " + gcd);

       }

4 0
3 years ago
Other questions:
  • If you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad?
    9·2 answers
  • In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
    7·1 answer
  • A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100; Course IS​ 101,
    15·1 answer
  • Design and implement a GUI application that uses text fields to obtain two integer values (one text field for each value) along
    9·1 answer
  • Should you configure if you want to limit access to files with certain classifications within a folder to a specific security gr
    13·1 answer
  • Discuss briefly general-purpose graphicsprimitives that contain 2D graphics library.
    15·1 answer
  • How are satellite radio, Internet radio, and podcasting different?
    11·1 answer
  • How do hand tools,Farm implements and farm equipment differ from one another
    6·1 answer
  • How is video compression accomplished?
    14·1 answer
  • Evaluating sorts given the following array: 41, 32, 5, 8, 7, 50, 11 show what the array looks like after the first swap of a bub
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!