1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
7

What is three-way handshake? Draw a diagram showing how a TCP connection is established through three-way handshake.

Computers and Technology
2 answers:
Levart [38]3 years ago
8 0

Explanation:

A three way handshake is a method to create a connection between host and server.It is used in a TCP/IP network.

To establish a connection three steps are followed which are as following:-

  1. The host or sender sends a data packet called SYN to the server or receiver.It's purpose is to as if the receiver is open for new connections.
  2. When the receiver receives the SYN packet it responds with an ACK or SYN/ACK packet as a confirmation for the connection.
  3. When the sender receives the SYN/ACK packet and it respond with ACK packet.

olga nikolaevna [1]3 years ago
6 0

Answer:

three-way handshake is a process that is used in a TCP/IP network to make a connection between the server and client.

Explanation: This 3-way TCP, is a three-step process that requires both the client and server to exchange synchronization and acknowledgment packets before the real data communication process starts.

The three-way handshake process is designed in such a way that both ends help you to initiate, negotiate, and separate TCP socket connections at the same time. It allows you to transfer multiple TCP socket connections in both directions at the same time.

You might be interested in
When Kim was working in her Microsoft® Excel® spreadsheet, she accidentally placed her book on the spacebar and erased the conte
zaharov [31]

Answer:

The undo tool.

Explanation:

Microsoft Excel is a spreadsheet application developed by Microsoft, it is used for analysing data. It's worksheets are made up of columns and rows or fields and records.

There are different ways of entering data to a cell. Click on the cell and type the data, copy and paste to the target cell, double-click on the cell to correct data and click on a cell and press the spacebar key to clear the data.

Excel records the action of event, so when a mistake is made like deleting a crucial cell data value, the undo tool is used to recover the data, since it holds records of events. The redo tool is the reverse of the undo tool.

5 0
3 years ago
A product/process is referred to as a key Technology during which of the
Rufina [12.5K]

The correct answer is D. Mature Phase

Explanation:

Most products go through four different phases, this includes the emerging phase, the growing phase, the mature phase, and the decline phase. In each of these phases, the product has a different impact on the general market.

In the case of the mature phase, this occurs once the product is established in the market, which means the product is known by many people and is considered as key or necessary. For example, nowadays smartphones are in the mature phase because these are an important part of the market or are key. Moreover, this phase occurs after the product grows in the market, and before it declines. Thus, a product is a key technology during the mature phase.

5 0
3 years ago
3. The wildlife department has been feeding a special food to rainbow trout finger lings in a pond. A sample of the weight of 40
andrey2020 [161]

Answer:

1)  402.7 grams. This estimate is called the sample mean.

2)  (399.11, 406.29)

3) The 99 percent confidence limits is between 399.11 grams and 406.29 grams.

I am 99% sure that the value lies between 399.11 grams and 406.29 grams.

Explanation:

sample size (n) = 40, the mean weight (x)= 402.7 grams and the standard deviation (σ)=8.8 grams

1) The point estimated mean weight of the population is 402.7 grams. This estimate is called the sample mean.

2) c = 99% = 0.99

α = 1 - 0.99 = 0.01

\frac{\alpha }{2} =\frac{0.01}{2} =0.005.

The z score of 0.005 corresponds with the z score of 0.495 (0.5 - 0.005).

z_\frac{\alpha }{2} =2.58.

The margin of error (e) = z_\frac{\alpha }{2}*\frac{\sigma}{\sqrt{n} }  =2.58*\frac{8.8}{\sqrt{40} } =3.59

The confidence interval = x ± e = 402.7 ± 3.59 = (399.11, 406.29)

3) The 99 percent confidence limits is between 399.11 grams and 406.29 grams.

I am 99% sure that the value lies between 399.11 grams and 406.29 grams.

8 0
3 years ago
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the s
Margaret [11]

<u>Normally windows end user can login 3 ways as follow:</u>

1. End user can Login as local account where user has not connected or even connected to local Area network LAN.

2. Next user can login into cloud accounts nothing but hot mail  accounts

3. Login to windows domain controller where end user should connect to LAN.

Purpose of installation of Windows domain controller with Active Directory is to keep trace and keep log history activities.

Due to windows domain controller with Active Directory end user desktop or laptop has control on software access also.

Every time when end user login on windows domain controller a small modified is executed whenever is required. It is not going effort the workstation performances.

Note: - Domain severs should be POWER on first.

7 0
3 years ago
What is machine level language ?​
NeX [460]

Answer:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1.

5 0
3 years ago
Other questions:
  • Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video
    14·2 answers
  • __________ is when a person feels compelled to acquire and abuse a drug despite the harm it causes him or her personally, and de
    7·2 answers
  • To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
    15·1 answer
  • A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate is known a
    6·1 answer
  • What is the effect of this program?
    5·1 answer
  • Mary can view the thumbnails of her presentation slides when she’s creating the slides which element of the programs interface i
    8·1 answer
  • Which of the following transferable skills are generally the most look for in the it <br> field
    10·1 answer
  • Science Help
    11·1 answer
  • The NVCC college professor receives frequent emails disguised as official business emails. They may be requests to reset a passw
    10·2 answers
  • What is professionalism and unprofessionalism in the work place?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!