1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
3 years ago
11

What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo

rk
Computers and Technology
1 answer:
pickupchik [31]3 years ago
6 0

Answer:

"message encoding, message size and message delivery" are the correct answer for the above question.

Explanation:

The above defined are the three requirements which are defined as the protocol used in communication. These three requirements are a very essential part of communication because-

  1. Message Encoding is the first requirement, which is used to encode the message so that the hacker can not hack the communication data from the network.
  2. The second requirement is Message size which fixed the size and the number of packets used to send for the communication.
  3. The third requirements are Message delivery, for which the protocol needs to define the mechanism to overcome the loss of the data.

You might be interested in
Write a method named addCommas that accepts a string representing a number and returns a new string with a comma at every third
pentagon [3]

Answer:

Locale unaware

'{:,}'.format(value) # For Python ≥2.7

f'{value:,}' # For Python ≥3.6

Locale aware

import locale

locale.setlocale(locale.LC_ALL, '') # Use '' for auto, or force e.g. to 'en_US.UTF-8'

'{:n}'.format(value) # For Python ≥2.7

f'{value:n}' # For Python ≥3.6

6 0
3 years ago
You can't cite Wikipedia, what are three ways that you can use it for your research?
Vlada [557]

Answer:

Scan over the article for references/resources, find general information about your topic, find keywords and terms you can use for further searching.

Explanation:

8 0
3 years ago
c724 wgu True or false. A storage device consists of all the components that work together to process data into useful informati
Law Incorporation [45]

Answer:

False

Explanation:

A output device consists of all the components that work together to process data into useful information

8 0
3 years ago
Complete the following sentences by choosing the best answer from the drop-down menus.
aleksandrvk [35]

Answer:

b. Application software

Explanation:

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

Examples:

Microsoft Office Word, Excel, Powerpoint

i think i did that right:)

7 0
3 years ago
Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What pr
goldfiish [28.3K]

Answer:

By keeping track of file links and deleting them along with the files

Explanation:

when different users create different files with the same name, and one tries to open one of the files, the first file that is found on the VTOC of the disk will be opened. These problems can be avoided by  tracking of all links to a file, and whenever there is a need to delete a file,  the link to the file as well should be deleted.

8 0
4 years ago
Other questions:
  • Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
    8·1 answer
  • Bailey wants to add file protection to a document she has created. She wants to restrict users from changing the content she has
    7·2 answers
  • Hello I'm new to coding and in my class, we have jumped straight into coding with zero experience and or lessons, this is my fir
    14·1 answer
  • Do most of you agree on a primary interpretation? Why?
    14·1 answer
  • In c++ when you create a class and you don't want to put the class and the main program in one source file and let's say you cre
    14·1 answer
  • Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist
    10·2 answers
  • Keyword stuffing is considered to be a black hat technique for SEO and is highly suggested today by Google.
    6·1 answer
  • I still haven't figured out how to award someone branliest will someone help me? If you explain to me how to do it i will do awa
    14·1 answer
  • Different the need for external or secondary memory​
    12·1 answer
  • If a company saw an online photo of you playing basketball, it might try to sell
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!