TCP is a reliable protocol. Verification of the data (to an extent) is performed. UDP is an unreliable protocol. It's a "fire and forget" protocol. Since the verification ( packet counts, checksums ) isn't being done, the application[s] have to do it.
Answer:
yeah but I gotta re-download it
The cloud is defined as the elastic leasing of pooled computer resource over the Internet.
Many companies currently use the cloud to store their information and infrastructure instead of leaving it on the physical computer. As time passes, more companies have continuously started to store their information on the cloud. Predictions show that in the future, nearly all companies will use this to store information.
Answer:
a. 255.255.255.0 (class C)
b. 255.255.255.224
Explanation:
Here, we want to give the implied subnet mask of the given classful IPV4 address
We proceed as follows;
Given IPv4 address: 200.200.200.200
Classes
Class A : 0.0.0.0 to 127.255.255.255
Class B: 128.0.0.0 to 191.255.255.255
Class C: 192.0.0.0 to 223.255.255.255
Class D: 224.0.0.0 to 239.255.255.255
so 200.200.200.200 belongs to Class C and it's subnet mask is 255.255.255.0
In CIDR(Classless Inter Domain Routing)
subnet /27 bits means 27 1s and 5 0s. so subnet
i.e 11111111.11111111.11111111.11100000 which in dotted decimal format is 255.255.255.224 .
Answer:
- Peripheral devices
Explanation:
Peripheral devices are defined as computer devices which are not the element of the essential/basic computer function. These devices can be internal as well as external and are primarily connected to the computer for entering or getting information from the computer. For example, the keyboards or mouse functions to enter data into the computer for processing and receiving information while the output devices like speakers, projectors, printers, etc. are used to get the information out of the computer.