1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
6

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first

acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires. True or False.
Computers and Technology
1 answer:
irinina [24]3 years ago
3 0

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires is True.

True

<u>Explanation:</u>

In network packet loss is considered as connectivity loss. In this scenario host A send two segment to host B and acknowledgement from host B Is awaiting at host A.

Since first acknowledgement is lost it is marked as packet lost. Since in network packet waiting for acknowledgement is keep continues process and waiting or trying to accept acknowledgement for certain period of time, once period limits cross then it is declared as packet loss.

Meanwhile second comes acknowledged is success. For end user assumes second segments comes first before first segment. But any how first segment expires.

You might be interested in
If your hood suddenly flies up you should turn on your hazard lights and continue driving. True or false?
Jobisdone [24]
False you shouldn't be driving with your hood blocking your vision. Pull over and turn on your hazard lights
8 0
3 years ago
Read 2 more answers
A teacher wants to check the typing proficiency of five students. She gives all of them the same passage to type. Which student
Hitman42 [59]

The student who uses macros for long words. They are most likely to pass words very easily because they have a macro. While not only saving time, also making a stunning performance as macros usually auto correct as well.

5 0
3 years ago
Someone help me I don’t know what to do /COMPUTER SCIENCE
nydimaria [60]
It kind of depends on the intended language, but I can see the following mistakes:

- lines not terminated with a semicolon (but not all languages require this)
- while statement missing parenthesis, ie., while (num1 <= num2), also not required in all languages
- statements below the while statement must be grouped by curly braces
- num1+5 should be num1=num1+5 or num1 += 5

Output will be:

10
15
20
25
30
5 0
4 years ago
Name the different payment systems the shophive.com isusing?
olganol [36]

Answer:

 Different payment systems the shophive.com is using are that everyone has the different feasibility and some users are comfortable with credit cards, debit cards while some users are comfortable with cash on delivery. Shophive brings the best opportunity for customers to experience the best online shopping in Pakistan. Unlike other online shopping website in Pakistan, shophive do not pressurize our customers.  As they provide customers with the freedom of choice and the flexibility so, that they live up their dreams.

4 0
3 years ago
What is an application letter?
BaLLatris [955]

A cover letter, covering letter, motivation letter, a letter of introduction attached to another document such as a résumé

7 0
3 years ago
Other questions:
  • Each​ _____ in a relational database table is a unique record of something that users want to track.
    14·1 answer
  • does someone know how to change G,o,o,g,l,e and utube location or choose what ads I wanna see, the ads and info that pops out on
    6·1 answer
  • The sequence of folders to a file or folder is called a(n) ________
    8·1 answer
  • Help with number 12 please!
    15·1 answer
  • What problems have arisen regarding use of the Internet for global business transactions, and how are they being resolved?
    15·1 answer
  • Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
    14·1 answer
  • Which is the best reason for why it is important to be careful about entering personal information online?
    10·2 answers
  • The contribution of Charles Babbage in the history of computer​
    6·1 answer
  • Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150,
    6·1 answer
  • when you enter a url, you’re creating a(n) ____ link, which is the full and complete address for the target document on the web.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!