1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
13

A TCP connection has reached a steady state and transmits data at a constant rate. List as many factors as you can that determin

e the transmission rate reached by the connection? Include the application and the operating system on both ends of the connection in your consideration.
Computers and Technology
1 answer:
Vaselesa [24]3 years ago
8 0

<u>TCP connection:</u>

Once TCP connections reached steady state that makes end user that connectivity is stable. But end user has to do analysis the pinging time ready. for example in operating system command prompt mode ends user have  to ping designation tcpip address.

<u>Computer A</u>

In command prompt mode end user try ping 10.10.10.10 –t (i.e. Computer B tcpip Address). End user tries to ping destination tcpip address if result comes in milliseconds then it is good connectivity rate.

Same away

<u>Computer B</u>

In command prompt mode end user try ping 10.10.10.20 –t (i.e. Computer A tcpip Address). End user tries to ping destination tcpip address if result comes in milliseconds then it is good connectivity rate.

End user can also check by executing TRACERT commands on designation tcpip address.  End user can find how the flow of network packets travels.

You might be interested in
When do we use an if- statement ​
wel

Answer:

You'd use an if statement if something happens. What I mean is that {If this happens} Then that happens but if the if doesnt happen then the then doesnt happen

Explanation:

3 0
3 years ago
Read 2 more answers
The most popular transmission media option for wired home ethernet networks is ________ cable. fiber-optic power-line unshielded
tino4ka555 [31]
<span>This is called an unshielded twisted pair cable, which is also known as a UTP cable. This type of cable has four pairs of wires that are twisted around each other. Because the wires are like this, the electrical interference is reduced.</span>
3 0
3 years ago
Create a Racket procedure compute_pos that reads numbers from the keyboard until 0 is read, count how many positive numbers are
Artyom0805 [142]

Answer:

import java.util.Scanner;

public class Solution {

   public static void main(String args[]) {

       compute_pos();

     }

     

     public static void compute_pos(){

     Scanner scan = new Scanner(System.in);

     int sum = 0;

     int counter = 0;

     // Prompt the user to enter an input

     System.out.println("Enter your value");

     // user input is assign to the variable value

     int value = scan.nextInt();

     

     while(value != 0){

         if (value > 0){

             sum += value;

             counter++;

         }

         System.out.println("Enter your value");

         value = scan.nextInt();

     }

     // Display the value of sum to the user

     System.out.println("The sum of the positive number is: " + sum);

     // Display the value of counter to the user

     System.out.println("The number of positive number is: " + counter);

   }

}

Explanation:

The first line import the Scanner class which allow the program to read input from the user. The class Solution is then defined. Then the main method which signify the beginning of execution in the program is defined. A method is called inside the main method.

The method compute_pos is defined. Inside the compute_pos method, a scanner object scan is declared to accept input from the user via the keyboard.

The variable sum and counter is declared and assigned to 0.

A prompt is displayed to the user to input a value. The user input is accepted and stored in the variable value.

Then a while loop is use to check the user input if it is not equal to zero. If it is equal to zero, the loop will end. Inside the loop, we first check to see if the user input is greater than 0, if it is, we add it to the variable sum and increase our counter by 1. At the end of the loop, a prompt is again display to accept input from the user.

Outside the loop, we display the sum and counter to the user.

8 0
3 years ago
A communication between two devices is over the maximum limit of an ethernet frame size. The Transmission Control Protocol (TCP)
umka2103 [35]

Answer:

D. Sequence number

Explanation:

The sequence number facilitates the keeping track of many segments. This enables it to determine which segments out of many in which it should be in. The sequence number field is usually 32 bits.

Sequence numbers are used in transmitting data because of their importance. Since data is transmitted in packets, they can be lost and as such the receiver uses the sequence numbers to reorder them.

6 0
3 years ago
Write the definition of a function named swapints that is passed two int reference parameters. The function returns nothing but
Alja [10]

Answer:

void swapints(int *j,int *k)//Function definition.

{

   *j=*j+*k-(*k=*j); //value swapping.

}

swapints(&j,&k);//call the function.

Explanation:

  • The above function definition takes the address of j and k variables which is stored on the pointer variable j and k.
  • Then the pointer variable uses the j and k value for the above expression, and the user does not need to return the value of j and k.
  • But when the user prints the value of the j and k variable, then he gets the swapping value of the j and k variable.
  • The user needs to know that the "int j" is a normal variable, but "int *j" is a pointer variable that is used to take the address of j variable.
3 0
3 years ago
Other questions:
  • A ___ is the basic collective unit of data in a computer.
    12·1 answer
  • In this question, we give two implementations for the function: def intersection_list(lst1, lst2) This function is given two lis
    15·1 answer
  • One is FPGA and other is ASIC. Budget, power consumption, and speed are the common parameters considered for the selection of th
    9·1 answer
  • Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
    9·1 answer
  • You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on
    10·1 answer
  • A. Write a program that asks the user to enter an integer, then prints a list of all positive integers that divide that number e
    11·1 answer
  • Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
    8·2 answers
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • If an individual receives 1.8 mGy while standing 4 ft from a source of radiation for 2 minutes, which of the following option(s)
    9·1 answer
  • Accenture has partnered with a global construction company that specializes in building skyscrapers. The company wants better ma
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!