1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
4 years ago
8

Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Ho

st C with destination port number 6789. Will both of these segments be directed to the same socket at Host C
Computers and Technology
1 answer:
Ann [662]4 years ago
5 0

Answer:

Yes, both of these segments (A and B) will be directed to the same socket at Host C .

Explanation:

Suppose both Host A and Host B each send a UDP segment to Host C with destination port number 6789, surely , both of these segments will be directed to the same socket at Host C .

Reason being that,  the operating system will provide the process with the IP details to distinguish between the individual segments arriving at host C- for each of the segments (A and B) recieved at Host C.

You might be interested in
The ACT science test takes___minutes.<br> A. 45<br> B. 30<br> C. 35<br> D. 60
Masja [62]

Answer:

a

Explanation:

8 0
3 years ago
Read 2 more answers
Anna is making a presentation on the solar system. She wants to emphasize the planet names as they appear one by one on the pres
Svetach [21]

slide transition effect.

5 0
3 years ago
A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their
drek231 [11]

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

4 0
4 years ago
Discuss how classification systems have undergone several changes over a period of time.
katen-ka-za [31]

With time, the classification systems have undergone numerous alterations. Aristotle made the first attempt at classification. He divided plants into three categories: trees, shrubs, and herbs.

On the other side, red blood cell presence or absence was used to categorise animals. The known organisms cannot all be categorised using this technique.

As a result, Linnaeus provided a two-kingdom classification scheme. Kingdom Plantae and kingdom Animalia are its constituent parts. However, this approach did not distinguish between eukaryotes and prokaryotes or between unicellular and multicellular creatures. As a result, there were numerous species that fell outside of the two kingdoms.

Thus, in order to classify the three kingdoms, Ernest Haeckel divided unicellular eukaryotic organisms into a separate kingdom called Protista.

Learn more about classification systems:

brainly.com/question/28391550

#SPJ4

4 0
1 year ago
Your friend is applying for a job at your company. She asks you to recommend her. She wants you to tell your boss that you have
Gekata [30.6K]
I think you should tell her you cannot lie about working with her
7 0
3 years ago
Other questions:
  • Assume the existence of a Building class with a constructor that accepts two parameters: a reference to an Address object repres
    9·1 answer
  • Define reverse engineering in hacker context
    15·1 answer
  • What consist(s) of a series of related instructions that tells the computer what to do and how to do it
    9·1 answer
  • What comes to mind when you see/hear QWERTY?
    14·2 answers
  • The ___________ process transforms new memories from a fragile state, in which they can be disrupted, to a more permanent state,
    10·1 answer
  • WILL GIVE BRAINLIEST!!!
    15·2 answers
  • What damage can a virus do to your computer?
    14·1 answer
  • True or false A job analysis weight the positives and negative of a given career
    13·1 answer
  • Date... Page No I write program to the check whether the supplied number is prime or not using a function procedor​
    13·1 answer
  • Being technologically literate requires being able to ______. a. use advanced graphics manipulation tools (adobe photoshop) b. u
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!