1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
3 years ago
8

Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Ho

st C with destination port number 6789. Will both of these segments be directed to the same socket at Host C
Computers and Technology
1 answer:
Ann [662]3 years ago
5 0

Answer:

Yes, both of these segments (A and B) will be directed to the same socket at Host C .

Explanation:

Suppose both Host A and Host B each send a UDP segment to Host C with destination port number 6789, surely , both of these segments will be directed to the same socket at Host C .

Reason being that,  the operating system will provide the process with the IP details to distinguish between the individual segments arriving at host C- for each of the segments (A and B) recieved at Host C.

You might be interested in
What is the purpose of using specialized supply chain software?
weeeeeb [17]

Answer:

The purpose of supply chain management is

On the most basic level, the purpose of supply chain management is to make inventory readily available in customer facing positions to fulfill demand. ... Supply chain partners must work together to maximize resource productivity, develop standardized processes, eliminate duplicate efforts, and minimize inventory levels

Explanation:

4 0
3 years ago
What is the difference between a Network Diagram and a Wiring Semantic?
stiks02 [169]

Answer:

Network diagram is the type of graphical networking chart that is basically used in the various type of computer telecommunication. The network diagram is useful for the networking designer and also for the network engineer for compiling the network documentation in detail.

Wiring semantic is the type of open source prototype platform which basically composed of the programming language and the IDE ( Integrated development environment). The wiring semantic consumer can affect the triggering the new data or information from the existing concepts.

7 0
3 years ago
A college team's BCS football ranking is comprised of three elements:1) the Harris Poll score, 2) the Coaches Poll score, and 3)
artcher [175]

Answer:

harris_poll_ranking = int(input("Enter team's Harris Poll ranking [1 - 2,850]: "))

coaches_poll_ranking = int(input("Enter team's Coaches Poll ranking [1 - 1,475]: "))

computer_ranking  = float(input("Enter team's computer ranking  [0 - 1]: "))

harris_poll_score = harris_poll_ranking / 2850

coaches_poll_score = coaches_poll_ranking / 1475

bcs_score = harris_poll_score / 3 + coaches_poll_score / 3 + computer_ranking / 3

print(bcs_score)

Explanation:

*The code is in Python.

Ask the user to enter the  harris_poll_ranking as int, coaches_poll_ranking as int and computer_ranking as float

Calculate the harris_poll_score, divide the harris_poll_ranking by 2850

Calculate the coaches_poll_score, divide the coaches_poll_ranking by 1475

Calculate the bcs_score, harris_poll_score, coaches_poll_score and computer_ranking by 3 and sum them

Print the bcs_score

6 0
3 years ago
What does limited access to a document mean?
Vlad [161]

Answer:

D. It does not reflect any changes made in the document

Explanation:

A limited access is usually done by middle level and top level managers in an organisation to prevent other staff member to edit or make changes to confidential documents when they are out of the office, though the staff can read it, they can not make changes to it.

6 0
3 years ago
Read 2 more answers
. What is a computer network? *
Citrus2011 [14]

Explanation:

Pretty sure its a group of two or more computers that are linked thogether

7 0
3 years ago
Other questions:
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
    11·2 answers
  • If you design your pages using a font that your user does not have installed, the browser defaults to ____ on a macintosh.
    13·1 answer
  • If a computer is not working properly,the best thing to do is ________?
    5·2 answers
  • He made me so angry when he didn’t let me make my point that I had to stalk after him.
    5·2 answers
  • Specifications that establish the compatibility of products and the ability to communicate in a network are called:
    10·1 answer
  • You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100
    5·1 answer
  • When testing a game, why might you consider throttling the game’s “frames per second”?
    9·1 answer
  • 1.erros can easily be ____ 2.work is done in an ____ no mess environment 3.colors do not _____ and brushes are never ______ 4.st
    14·1 answer
  • HELP ME PLEASE 41 PTS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!