1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
10

Which of the following is true of how packets are sent through the internet?

Computers and Technology
2 answers:
lara [203]3 years ago
6 0
I think the answer is A
horrorfan [7]3 years ago
3 0

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

You might be interested in
After the explosion of the Union Carbide plant the fire brigade began to spray a curtain of water in the air to knock down the c
AysviL [449]

Answer:

d. The system of water spray pipes did not have sufficient water supply

Explanation:

The Union Carbide India Ltd. was chemical factory situated at Bhopal that produces various pesticides, batteries, plastics, welding equipment, etc. The plant in Bhopal produces pesticides. In the year 1984, on the night of 2nd December, a devastating disaster occurred on the Bhopal plant which killed millions of people due to the leakage of the poisonous, methyl isocyanate. This disaster is known as Bhopal Gas tragedy.

Soon after the gas pipe exploded, the fire brigade started spraying water into the air to \text{knock down} the cloud of the gases in the air but there was not sufficient amount of water in the water sprays and so it was not effective.

Thus the correct answer is option (d).

4 0
3 years ago
Why is there more than one Brainly website?
marta [7]

they are for different countries and languages

8 0
3 years ago
Read 2 more answers
Statement: There are two files. One file, "badIP_list.txt" has a listing of known bad IP addresses. These addresses were extract
lapo4ka [179]

Answer:

See explaination

Explanation:

SOURCE CODE IN PYTHON:

inp=open('badIP_list.txt', 'r') #opening file for input

badIPs=[i.rstrip('\n') for i in inp.readlines()] #reading bad IPs

inp.close() #closing file

inp=open('server_logs.txt', 'r') #opening file for input

IPs=[i.rstrip('\n') for i in inp.readlines()] #reading all IPs from log

inp.close() #closing file

uniqueBadIPs=[] #to store unique bad IPs

countBadIPs=0 #to store count of bad IPs

countIPs=0 #to store count of all IPs

for IP in IPs: #iterating through the log of IPs

if IP in badIPs: #checking if IP is bad

countBadIPs+=1

if IP not in uniqueBadIPs: #checking if bad IP is unique

uniqueBadIPs.append(IP)

countIPs+=1

out=open('filter_list.txt', 'w') #opening file for output

out.write('_________________________________________________________\n')

out.write('Date : 26/07/2018\nName : Last, First\nMajor: CS\n\n')

out.write('Server logs contained these known bad IP addresses:\n')

for IP in uniqueBadIPs: #output the unique bad IPs

out.write(IP+'\n')

out.write('\n')

out.write('Total unique known bad IP\'s detected:\n'+str(len(uniqueBadIPs))+'\n\n')

out.write('Percentage of bad IP addresses in server logs:\n{:.2f}%\n'.format(countBadIPs*100/countIPs))

out.write('_________________________________________________________')

out.close() #closing file

5 0
3 years ago
To keep you from inadvertently moving controls as you work in the IDE, click the form or control, then click the _________ optio
Delicious77 [7]

Answer:

Lock Control

Explanation:

Lock Control can used to keep you from inadvertently moving controls while working in the IDE.You can do that by  clicking on the form and then click Lock control in format menu.

In visual studio you have to go to properties and and select Locked property and select True.So that it can be locked and you can unlock them also from here.

5 0
3 years ago
On laptops, wireless cards tend to be attached to which panel?
Arada [10]

Answer:

NONE of the above   to fix  wireless  cards to be attached to any panel

Explanation:

Basically, the WiFi receiver and transmitter are fixed in the mother of the laptop and fixed. In case if we   open the laptop if PCI slot is   available   and suitable WiFi card and able fit it  to size then   end user he or she  can fixed and  try

The hard drive is the backside of the laptop. If e place the WiFi system will able to boot.

LCD panel it is just displayed out the unit and  its  fixed in a different  place and connected to led or LCD panel

Palm rest it places where there is no slot available  

Ram panel if we fix WiFi card then the laptop will not start.

Better by USB dongle and use it.

5 0
3 years ago
Other questions:
  • What types of storage can be used to access your data on another computer?
    7·1 answer
  • Radiation requires a heated liquid to transfer energy. Please select the best answer from the choices provided T F
    10·2 answers
  • This information is generally included on a fax cover sheet.
    15·1 answer
  • John is considering his STEM education choices. He wants to begin working in the technology field as soon as possible.
    12·1 answer
  • Which option marks all modification made within a document? Review Comment Track Changes Balloons
    15·2 answers
  • Banking Account
    9·1 answer
  • What is the difference between delete and backspace key?​
    12·2 answers
  • Baking Cookies. Sweet Dough Inc. bakes cookies—a popular dessert—based on the quantities ordered by their customers. Three raw m
    12·1 answer
  • What is an example of Big Data?
    10·1 answer
  • Discuss the relationship amongst the following basic file elements: • Field. • Record. • File. • Database. • Directory.​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!