1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
6

What is the purpose of the "time-to-live" (TTL) field of the IPv4 packet? a. ensures that the packet remains in the network long

enough to reach its destination b. it was used when the Internet was very slow, but is no longer needed c. it prevents the packet from remaining indefinitely in the network thus helping to prevent network congestion d. none of the above describes the purpose of the TTL field
Computers and Technology
1 answer:
Arisa [49]3 years ago
6 0

Answer:

c. it prevents the packet from remaining indefinitely in the network thus helping to prevent network congestion

Explanation:

It prevents the packet from remaining indefinitely in the network thus helping to prevent network congestion

TTL is a value which is shown so that we can estimate that the packet that will tell the network router whether the packet has been in the network for enough time so that it should be discarded from the network or not.

You might be interested in
Google Ads was constructed around three core principles, focused on helping businesses reach their online potential. The first o
PolarNik [594]

Answer:

True

Explanation:

Google Ads was constructed around three core principles, focused on helping businesses reach their online potential. The first of these is relevance. Google Ads connects businesses with the right people at the right time. The other principle is control and results.

7 0
4 years ago
What size hard disc is recommended for powerpoint writting
mixas84 [53]

Answer:

Depends on how many PowerPoint files you want to store and how long they are. I'd recommend at least a 256GB hard drive to store your OS and software and then leave space for PowerPoints.

5 0
3 years ago
What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
vovangra [49]
The threats as well as the risk and vulnerabilities are present with the WLAN. The WLAN would encounter security issues with the range of the signal which is wireless, SSID broadcasting, password security and the packet sniffing or the capturing of signal.
4 0
4 years ago
Farah works in an office with two other employees. All three share a printer and an Internet connection. The utility that makes
NNADVOKAT [17]

Answer: SOHO

Explanation: I hope this help you out!

5 0
3 years ago
Read 2 more answers
Cual es el procedimientos para asistir en el transporte publico a personas discapacitadas
artcher [175]

Answer:

Una discapacidad física o motora en una o más partes del cuerpo obstaculiza las acciones y / o movimientos de la persona con discapacidad. La discapacidad puede surgir porque las partes del cuerpo no han crecido completamente o están dañadas (anomalías físicas) o porque las funciones físicas están alteradas (anomalías funcionales).

En la mayoría de los casos, se proporciona una ayuda a las personas con discapacidades físicas graves para que puedan desenvolverse más fácilmente en la sociedad. Alguien con una discapacidad motora severa en las piernas a menudo usa una silla de ruedas. Las personas con una discapacidad motora de las manos (pérdida de la motricidad fina) o de los brazos pueden compensar esto con un manipulador o ayudas especializadas en tareas, como un dispositivo para comer o un dispositivo para girar las hojas.

Así, todos estos elementos deben ser posibles de ser insertados en los medios de transporte público como forma de ayudar a estas personas a trasladarse por estos medios, es decir, los autobuses, trenes, etc., deben estar adaptados para poder recibir allí a pasajeros en sillas de ruedas o con necesidades motoras especiales.

7 0
3 years ago
Other questions:
  • 48. What is another word for processor?
    7·1 answer
  • The _______ valve protects the air pump from reverse-exhaust pressure.
    11·1 answer
  • In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
    13·1 answer
  • What category of sensory receptors are sensitive to touch sound and motion?
    10·1 answer
  • Describe the positive and negative effects of Internet​
    6·2 answers
  • write the program or pseudocode algorithm that computes the product and average of three integers and display the results​
    7·1 answer
  • Does anyone have a rbx account? If they do friend request Tribalchief777
    8·1 answer
  • After you have located a program name from the Start menu, in order to create a shortcut on the desktop.
    8·1 answer
  • 1. List three tabs that make up the Ribbon
    14·1 answer
  • Which best describes how information is sent on the internet?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!