1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
4 years ago
5

What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the

data was recieved or to request the retransmission of missing data?
Computers and Technology
2 answers:
Leviafan [203]4 years ago
7 0

Answer:

upper-layer connection-oriented protocols

Explanation:

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

Semenov [28]4 years ago
4 0

Answer:

An upper-layer, connection-oriented protocol or service

Explanation:

Connectionless acknowledgements are used to request retransmission.

Upper-layer connection-oriented protocols keeps track of the data received and can request retransmission from the upper-level protocols on the sending host.

A Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available.

The best-effort delivery process guarantees that all packets that are sent are received.

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

You might be interested in
Establishing responsibilities, planning to best support the organization, acquiring validity, ensuring performance, conformity w
RUDIKE [14]

Answer: B. ISO 38500

Explanation:

ISO 38500 is an international Standard specifically developed by the International Organization for Standardization to oversee corporate governance of Information Technology. It lays down principles to guide directors and leaders of organizations on how to comply with regulatory requirements in the use of Information Technology within the firm.

The framework consists of six guiding principles in the use of I.T and they include; establishing responsibilities, planning or strategizing on how best to support the organization, acquisition of validity, ensuring performance, conformity with rules and respect of the human factor or behavior.

It was derived from the Australian Standard for Corporate Governance of Information and Communication Technology - AS 8015 - 200.

8 0
3 years ago
Which of the following is not a valid variable name? 2 myInt 2. return 3. myInteger 4. total3
Reptile [31]

Answer:

Correct answer is option (2) that is "return".

Explanation:

In any programming language, a variable name can be made up of letters (lower and upper case) and digits. we can also use "_" underscore character for declaring the variables but we cannot use any special character like “$”.We cannot use digits in the beginning of variables name. And we also cannot use reserved keywords of the language like "new","return","while" etc. There should not be space between the variable names. Options 1, 3 and 4 are not violating any of these properties. But in option (2), "return" is a reserved keyword. That is why it is not a valid variable name.

Some example of valid variables name:

foo

BAZ

Bar

_foo42

foo_bar

Some example of invalid variables name:

$foo    ($ not allowed)

while   ( keywords )

2foo    (started with digit)

my foo  (spaces )

5 0
4 years ago
A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions,
melomori [17]

Answer:

It may be that the amount of ram is not compatible with that computer, it may not support ram that is over 8 GB or higher, it may not be properly installed in the hardware, or the motherboard may not be able to read it.

Explanation:

Hardware and software is very unbalanced when it comes to new RAM being installed, as people complain about this exact same issue many times.

5 0
3 years ago
The ________ coordinates the flow of data and information through the computer system by coordinating the hardware, software, us
Irina-Kira [14]

Answer:

Operating System.

Explanation:

All the properties listed in the question are handled by the Operating system.

Operating system:-It is a software that manages the computer hardware,provides common services for the programs of the computer and software resources.

Some of the most popular operating systems are as following:-

  1. Microsoft Windows.
  2. Apple MACOS
  3. Linux.

There are also other operating systems present out there these are some of the mostly used OS's.

8 0
3 years ago
Which of the following is not true about primitive data types.
SVEN [57.7K]

Answer:

The point 2 is incorrect as Primiticve data types are immutable

Explanation:

3 0
3 years ago
Other questions:
  • Which one of the following words means most nearly the opposite of RANDOM? (remember,opposite)
    12·1 answer
  • The crash rate per mile is ..
    12·2 answers
  • What are some common security threats for our home devices and IoTs?
    14·1 answer
  • Practice problems on functions. Write C function(s) to carry out the specified tasks. For each problem, also write the suggested
    15·1 answer
  • )In a graph represented by adjacency matrix u can find all the neighbours of a given vertices in ____Operations
    6·1 answer
  • Directions: Asba student of Contact Center Service, you already have an experience using different computer programs. Try to rem
    8·2 answers
  • Before you ever buy your first stock or bond, it's important to understand what type of investor you are. This depends on a numb
    12·1 answer
  • What is the output?
    12·1 answer
  • Pls help me Pls help me
    13·1 answer
  • Does anyone know the answer
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!