1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
10

Which of the following is true of how packets are sent through the internet?

Computers and Technology
2 answers:
lara [203]3 years ago
6 0
I think the answer is A
horrorfan [7]3 years ago
3 0

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

You might be interested in
katniss dismisses effie's metaphor because, literally, she knows pearls cannot be created with pressurised coal,they come from w
Marta_Voda [28]

Answer:

oysters

Explanation:

oysters form pearls inside their mouths, it's a very long process, and most oysters never finish or do them

please give brainliest

8 0
3 years ago
Read 2 more answers
John wants to add a border to an image he has inserted on a slide. Which of the following groups on the Picture Tools Format tab
weeeeeb [17]

great question I don't know the answer

4 0
2 years ago
What are ways to access Tasks view in Outlook? Check all that apply. Select To-Do List or Task Folder. View daily task lists in
SVETLANKA909090 [29]

Answer:

A. B. D. E.

Explanation:

edg 2021

8 0
2 years ago
Read 2 more answers
How to get to command prompt screen if i forgot password?
Sidana [21]
Commands into software documents tools
3 0
3 years ago
What special case exists when managing linked lists?
tiny-mole [99]

Explanation:

The special case that exists in linked list when we are managing them is when we are dealing with the first element of the list.

When we create a linked list we create a first node separately.

If we delete or add element in front of the first element we have to carefully handle that case.

Hence the special case is when we are dealing with the first element of the list.

6 0
2 years ago
Other questions:
  • Give a pseudo-code description of the O(n)-time algorithm for computing the power function p(x,n).Also draw the trace of computi
    5·1 answer
  • Ive looked everywhere on brainly and we have no answers for computers and technology
    7·1 answer
  • How long does a bankruptcy affect your financial reputation
    13·1 answer
  • Whats the best app for cheaters​
    9·1 answer
  • Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
    8·1 answer
  • Which form of currency is not backed by gold today
    14·1 answer
  • In online education is intrinsically related to equity. Professionalism Communication Accessibility
    8·2 answers
  • Describe the features of agile modeling​
    5·1 answer
  • __________ implements a security policy that specifies who or what may have access to each specific system resource and the type
    8·1 answer
  • How do i delete cookies on a chromebook?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!