1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
4 years ago
5

Which field in a Transmission Control Protocol (TCP) header provides the next expected segment?

Computers and Technology
1 answer:
Papessa [141]4 years ago
3 0

In a Transmission Control Protocol (TCP) header next  Expected segment is provided by Acknowledgment Number

Explanation:

  • TCP is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in the Internet Protocol.
  • The fields in TCP Segment Header are Source Port, Destination Port, Sequence Number, Acknowledgement Number, Header Length, Flags, Window Size, TCP Checksum and Urgent Pointer.
  • The Acknowledgment Number is a  32 Bit number field which indicates the next sequence number that the sending device is expecting from the other device.
  • The SYN packets consume one sequence number, so actual data will begin at ISN+1. The sequence number is the byte number of the first byte of data in the TCP packet sent.
  • If the acknowledgment flag is set in the flags field, the acknowledgment number field holds the sequence number of the next byte that the receiver expects.
You might be interested in
After running this Assembly language program below, give the final values in EAX, EBX, and ECX. MOV EAX, AAAAAAAA MOV EBX, BBBBB
Verdich [7]

Answer:

See explaination please.

Explanation:

We are going to get a solution by making use of the instruction;

Given The instruction,

MOV EAX, AAAAAAAA

MOV EBX, BBBBBBBB

MOV ECX, CCCCCCCC

This is going to move the defined values, say AAAAAAAA, BBBBBBBB, CCCCCCCC, to the registers EAX, EBX, ECX, respectively

Now,

PUSH AX

This push instruction pushes the first 8 bits in register EAX, to a stack,

again, PUSH BX

Also this push instructions will also push the first 8 bits in register EBX, to the stack

PUSH CX

This push instruction pushes the first 8 bits in register ECX, to the stack,

similarly PUSH BX PUSH AX PUSH CX pushes the 8 bit registers in the same stck,

NOw, the instructions POP EAX POP EBX POP ECX

will lead to the contents of the respective registers as

EAX=CCCCAAAA EBX=CCCCBBBB ECX=AAAACCCC

4 0
4 years ago
Read 2 more answers
You can use the ____ utility to zero in on the service or other program that is slowing down startup. 1. gpupdate 2. MSconfig 3.
Step2247 [10]
I'd say MSconfig, you can use that and view the 'processes' tab, but it will make you open up the task manager.
3 0
3 years ago
When using e-mail for business purposes, employees should _____.
harina [27]

Answer:use spell check

proofread messages

use appropriate punctuation

be brief

use correct grammar

Explanation:

3 0
3 years ago
Given that a function receives three parameters a, b, c, of type double, write some code, to be included as part of the function
MA_775_DIABLO [31]

Answer:

if ((b*b - 4*a*c)<0)

    cout << "no real solutions";

return;

Explanation:

To check if "b squared" – 4ac is negative, we use the expression  if ((b*b - 4*a*c)<0). This expression evaluates the 'bsquared' and substracts '4ac' from it. It then compares the resulting value with zero. if it is less than zero it means it is a negative number, so it executes the statement following cout << "no real solutions"; and returns

8 0
4 years ago
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items effic
sashaice [31]

Answer:

the ergonomics To prevent a laptop from being stolen, you can use a surge protector. False; To prevent laptops from being stolen, you can use a cable lock. What is a digital certificate?

6 0
2 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • If you touch a downed power line covered or bare, what’s the likely outcome?
    10·2 answers
  • By observing human behavior,_______are able to understand the cause and effect relationship between the supply of things we want
    13·2 answers
  • A user on a corporate laptop discovers that their bank account and social media accounts have all been hacked. The user has high
    12·1 answer
  • NOTE: in mathematics, the square root of a negative number is not real; in C therefore, passing such a value to the square root
    15·1 answer
  • select all examples of proper keyboarding technique. rest your fingers gently on the home row or home keys. slouch in your chair
    9·2 answers
  • Print 1 to 100 in visual basic .6
    10·1 answer
  • 1. How do you identify the location of components and replacement procedures for notebook systems?
    6·1 answer
  • This zyLab activity prepares a student for a full programming assignment. Warm up exercises are typically simpler and worth fewe
    8·1 answer
  • 1.   Microsoft Office is ?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!