1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
11

A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35

and 65 get lost. The client will receive _______ duplicate acknowledgements after the server received segment
Computers and Technology
1 answer:
ikadub [295]3 years ago
3 0

Answer: I believe the answer is 6

Explanation: taking 35 and 65 out leaves the rest of the numbers; 15,25,45,55, and 75.

You might be interested in
An undesirable jagged appearance is referred to as
Papessa [141]

What do we have to answer spectificly

7 0
3 years ago
Read 2 more answers
Create a jQuery ready listener that updates the options within the element with ID toCurrency such that: The first element is: S
nlexa [21]

Answer:

Enter USD and select desired currency.

US Dollars (USD): 100.00

Select Currency: Canadian Dollar (CAN)

Canadian Dollar (CAN): 130.00

Explanation:

See full code attached.

5 0
3 years ago
Electricity was seen as a mysterious force and began to creat a stir when people called​
atroni [7]

This isn't related to computers and when you look it up all it comes up with a Stars Wars.

3 0
3 years ago
Write a short essay on the importance of information and communication technology (ICT) in the AFN industry. Add suitable exampl
AURORKA [14]

Answer:

computer

Explanation:

is an ICT device that help and makes things or work easy

6 0
3 years ago
You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c
sergejj [24]

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

4 0
3 years ago
Other questions:
  • When a cache block has been modified since being read from main memory?
    10·2 answers
  • 2. What's the keyboard command that will allow you to "copy" text?
    8·2 answers
  • HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order
    14·2 answers
  • If a*b = 2a - 56, calculate the value of<br>3 * 4​
    14·1 answer
  • Choose the HTML5 element below that is used to configure an area on a web page that can stand on its own and could potentially b
    5·1 answer
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • Explain how SEO impacts the way you should interpret search engine results ???
    6·1 answer
  • Who plays xbox one offline and knows some multiplayer games that can be played offline.
    15·2 answers
  • g How safe is to have a LinkedIn account where you have published all the important information about yourself
    13·2 answers
  • What is multimedia computer system​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!