1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
9

Which layer of the OSI reference model is responsible for ensuring flow control so that the destination station does not receive

more packets that it can process at any given time? Group of answer choices
Computers and Technology
1 answer:
Nady [450]3 years ago
8 0

Answer: The Transport Layer of the OSI reference model is responsible for ensuring flow control so that destination station does not receive more packets that it can process at any given time.

Explanation: This is because;

The transport layer is the fourth layer in the OSI layered architecture which builds on the network layer to provide data transport that moves from a process on a source machine to a process on a destination machine. It is hosted using single or multiple networks, and very responsible for reliable data delivery ensuring packets are delivered in sequence, error-free and with little or no duplication or losses.

Since Transport layer helps one to control the reliability of a link through flow control, error control, and segmentation or desegmentation, It determines how much data should be sent where and at what rate.  

The transport layer also offers an acknowledgment of the successful data transmission and sends the next data in case no errors occurred. TCP (Transmission Control Protocol )is the best-known example of the transport layer. Transport layers also retransmit messages if they arrive with errors.

You might be interested in
File-sharing programs such as Napster, Kazaa, and iMesh make it possible for individuals to exchange music files over the Intern
Mashutka [201]

Answer:

Option A) Demand for CDs has decreased, causing equilibrium price and quantity to decrease.

is the correct answer.

Explanation:

  • File-sharing is a common practice nowadays. It helps us by providing access to different files (audio , video, images, documents) to others in a faster way.
  • A wide range of files are shared daily by using different means of file-sharing including computer networks and peer-to-peer networking.
  • Formerly, the data was shared using CDs but now this system has been replaced with the advent of internet.
  • Usage of CDs is dropped drastically and hence their demand is decreased.
  • So now the prices of CDs are not in equilibrium and their quantity is also decreased.

i hope it will help you!

3 0
3 years ago
Which types of computers are used by large businesses
aniked [119]

answer:

Mainframe computers are used by large companies and organisations to perform critical tasks that involve bulk data processing like transaction processing, census information, statistical data and so on. They consist of extensive input and output facilities, are very stable and dependable and handle millions of transactions every day

Explanation:

4 0
3 years ago
A growing number of large organizations have built internal Web sites that provide opportunities for online social networking am
Flauer [41]

Answer:

True

Explanation:

The ideology of building internal web sites  for online social networking among employees is aimed towards productivity.

<em>For example, when an employee is finding a specific job difficult and is connected with someone on the social websites created by the organization, the employee will get help in no time to ensure that the organization achieve maximum productivity.</em>

It will constantly keep each employee informed on the organizations policies, goals and achievements.

However, there are shortcomings of online social networking in the workplace:

  1. If not properly managed, It might become addictive and will lead to low employee productivity.
  2. Great intellectual minds might be exposed to negative influences from within the organisation

8 0
3 years ago
The purpose of the trusted platform module is:
Elza [17]
A Trusted Platform Module is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. Each TPM chip contains an RSA key pair called the Endorsement Key. The pair is maintained inside the chip and cannot be accessed by software.
6 0
3 years ago
Read 2 more answers
Electronically, or on paper draw a Binary Search Tree using the values below. Note: Insert each value into the tree in order fro
maria [59]

Answer:

A.)  in order traversal - 9 32 35 14 27 25 2 7 29

B.) pre-order traversal - 25 14 32 9 35 27 7 2 29

C.) post-order traversal - 9 35 32 27 14 2 29 25

Explanation:

Given - 25, 14, 7, 32, 27, 2, 29,9,35

To find - On a separate electronic page or sheet of paper:

1. List the values using in order traversal

2. List the values using pre-order traversal

3. List the values using post-order traversal

Proof -

Given values are -

25, 14, 7, 32, 27, 2, 29,9,35

1.)

In order is -

9 32 35 14 27 25 2 7 29

2.)

Pre-order is - (Root left right)

List nodes of first time visit

25 14 32 9 35 27 7 2 29

3.)

Post-order is - (Left Right Root)

List nodes of third time visit

9 35 32 27 14 2 29 25

5 0
3 years ago
Other questions:
  • Is anyone familiar in drawing flow charts for c++ programming
    14·1 answer
  • How many packets does your computer send/receive in a single mouse click when you visit a website?
    6·1 answer
  • Backlighting allows for maximum detail to be seen in the front of the object you are photographing.
    7·1 answer
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • Can multiple processors can be installed in a single processor housing?
    14·2 answers
  • Identify examples of loop structures using comments in your code. Be sure your examples address each of the following: i. Item-b
    6·1 answer
  • Write code which takes two inputs from the user, a number of sides followed by a side length, then creates a regular polygon wit
    10·2 answers
  • What is the answer ????​
    13·2 answers
  • Identify the calculation performed by the following code.
    7·1 answer
  • Operating systems move code and data, as necessary, to a portion of the disk that is used as if it were memory, not just disk st
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!