1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
3 years ago
15

63:47 One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malfor

med segments. Which Transmission Control Protocol (TCP) flag will be used? SYN PSH RST FIN
Computers and Technology
1 answer:
vovangra [49]3 years ago
7 0

Answer:

RST

Explanation:

What is RST TCP?

In a stream of packets of a TCP connection, each packet contains a TCP header. Each of these headers contains a bit known as the "reset" (RST) flag. ... One common application is the scenario where a computer (computer A) crashes while a TCP connection is in progress.

Why TCP RST is sent?

RST is sent by the side doing the active close because it is the side which sends the last ACK. So if it receives FIN from the side doing the passive close in a wrong state, it sends a RST packet which indicates other side that an error has occured.

You might be interested in
Match the careers with the education required for each job
Gekata [30.6K]
Statistician for the last one network administaror for the next one then animator then broadcast tech
6 0
3 years ago
While checking your work e-mail, you have received an e-mail warning you about a virus that is currently doing the rounds. What
choli [55]

Answer: D) Do an extensive web search to learn if it is a real virus.

Logical explanation: In the example, it is not a pop-up that you have a virus and instead an email that you have a virus. There is a very likely way that it could be a prank, scam, or a hacker.

Elimination explanation: If we look at all the answers:

A (Forward it to everyone in your address book) makes no sense, so A is eliminated.

Then with B (Forward it to your tech administrator) makes sense because if it was a real virus they may know what to do, but as my 'Logical explanation' explains, it may not be.

Finally with C, it's very irresponsible and should not be done. If it was a real virus there is a possibility it could be someone trying to steal information and more.

This leaves only option D left. :)

<h2><u>If this helped at all (or not), please remember to rate, thank, and mark brainliest as seen fit. Have a great day and stay safe! :)</u></h2>
4 0
3 years ago
Brief description email etiquette​
Solnce55 [7]

Answer: See explanation

Explanation:

Email etiquette is defined as the code of conduct which helps to guide the behavior when people send or respond to emails. Some of ail etiquette include:

• Using proper and correct grammar and punctuations.

• Replying quickly too emails.

• Including a clear and direct subject.

• Proofreading of messages.

• Cautious with humour.

• Sending of smaller files and compressing large files.

7 0
3 years ago
What type of redundant storage configuration is most common for hosting the operating system and applications on a server
Ne4ueva [31]

Answer:

RAID 1 is the redundant storage configuration

Explanation:

6 0
2 years ago
With what software tool can you see the applications
Zigmanuir [339]

Answer:

The Microsoft Windows Task Manager.

6 0
3 years ago
Other questions:
  • Which pane displays commands that change relative to the activity taking place in the presentation window's main work area?
    15·1 answer
  • Suppose a computer has 16-bit instructions. The instruction set consists of 32 different operations. All instructions have an op
    7·1 answer
  • Which of the following are best practices that should be done in Photoshop before placing images in InDesign?
    11·1 answer
  • Write a function called show_info that takes a name, a home city, and a home state (a total of 3 arguments) and returns a full s
    12·1 answer
  • Original list:0,0,0,0,0,0,0,0
    10·1 answer
  • Multiply the following two Tom's Tiny floating-point format numbers (8-bit: sign bit, 3-bit 2's complement exponent, 4-bit fract
    12·1 answer
  • Please tell me which ones go into which categories no files!!
    11·1 answer
  • Comprehension s best described as the ability to
    15·2 answers
  • 2. Which of these Is NOT part of the definition of Electricity?
    8·2 answers
  • Essay:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!