1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
5

When a file is transferred between two computers, two acknowledgment strategies are possible. In the first one, the file is chop

ped up into packets, which are individually acknowledged by the receiver, but the file transfer as a whole is not acknowledged. In the second one, the packets are not acknowledged individually, but the entire file is acknowledged when it arrives. Discuss these two approaches.

Computers and Technology
1 answer:
ExtremeBDS [4]3 years ago
4 0

Answer:

Client server system, packets in the network and the discussion regarding two approaches have been done. See the attached pictures.

Explanation:

See attached pictures for explanation.

You might be interested in
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
Which of the following calculates to 10?
nikdorinn [45]
The third one because u have to do parenthesis
7 0
3 years ago
Read 2 more answers
what identifies a cell or a range of cells on a worksheet, and tells excel where to look for values or data you to use in a form
zloy xaker [14]
I believe it is a cell Reference
6 0
2 years ago
Most general-purpose applications use a(n) ________ that displays graphical elements called icons to represent familiar objects.
kirill [66]

A general purpose application is often called a 'off-the-shelf'. It is a kind of software that one can use at home and school. Most general-purpose applications use a graphical user interface that displays graphical elements called icons to represent familiar objects.

The graphical user interface is simply defined as a type of user interface that gives users permission to interact with electronic devices via the aid of graphical icons and audio indicator such as primary notation.

  • General purpose application software is simply defined as a type of application that is used for different kind of tasks.

It is not known to be able to perform more than one function. For example, a word processor.

Learn more from

brainly.com/question/2919813

6 0
2 years ago
Helpppppppppp plssss
DENIUS [597]

Answer:

Hey! So i was just in computer science! so i think the answer is B!

Explanation:

3 0
3 years ago
Other questions:
  • In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by
    14·1 answer
  • In number theory, a perfect number is a positive integer that is equal to the sum of its proper positive divisors, that is, the
    12·1 answer
  • Effective feedback should focus on the behavior, not the person.<br><br> True<br> False
    9·2 answers
  • The scope of a variable declared outside of any function is:
    11·1 answer
  • A type of Knowledge Management System is called
    5·1 answer
  • A write once, read many (worm) disc is a common type of _____.
    6·1 answer
  • This image shows a web designer's grids for different pages on a website. The uppermost box on each page is the website's identi
    14·2 answers
  • Need answer Asap!!!! Which file type is the best choice if the image will be made into a billboard?
    12·1 answer
  • What is the name of the function below?<br><br> function go(){<br> alert("hello everybody");<br> }
    10·1 answer
  • In ip address 202.54.15.178, 15.178 is ______ address.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!