1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
6

One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed se

gments. Which Transmission Control Protocol (TCP) flag will be used?
Computers and Technology
1 answer:
Pavel [41]3 years ago
3 0

Answer:

TCP RST flag

Explanation:

The RST is the Transmission Control Protocol, TCP Reset  package sent back to a source of an unexpected TCP packet by the host, as a response, through the same route connection.

Where one side of the TCP connection has received malformed, unexpected packets such that the TCP connection is yet to recover, the TCP reset package, RST, is sent to the source of the packets to indicate the need for the termination of the connection due to a fatal error

You might be interested in
What best describes the kinds of online items that are usually protected by copyright law?
Sergeu [11.5K]

technically, anything that is copyright protected. but the answer that best describes the kinds of online items that are usually protected by copyright law?  the answer is D. Most media work that is available for money


Hope this helps!

-SchoolIsBlaaa

7 0
3 years ago
Among the second generation home console companies,which managed to come out on top
crimeas [40]

Answer:

The second generation of home consoles occurred from (1976-1988) at this time the most popular and consoled regarded as best was the Atari 2600

Explanation:

answer from Cligon768 on this site

3 0
4 years ago
Assume a disk cache hit rate (dchr) of 95% and 2 millisecond on average to access a page in cache. If the average access time to
MrRa [10]

Answer:

The answer is provided in the form of explanation

Explanation:

A page fault occurs means that the required page is not in main memory. First OS check for

page in the cache memory, if the page is present then retrieved but if not present then check for

page in main memory and if the page is not present here too then it searches for page in hard

drive. To calculate the expected time, the following formula is used:

Cache hit ratio = 95% = 0.95

Cache miss ratio = 5% = 0.05

Cache access time = 2 millisecond

The average access time of hard drive = 30 milliseconds

Expected time = Hit ratio (cache access time +memory access time) + Miss ratio (cache

access time + 2 * memory access time)

= 0.95 (2+30) + 0.05 (2+2*30)

= 0.95 (32) + 0.05(62)

=30.4 + 3.1

= 33.5 millisecond

Expected time = cache hit ratio * cache access time + (1 – hit ratio) * cache miss ratio

= 0.95*2+(1-0.95)*0.05

= 1.9025

4 0
3 years ago
Under which license is open-source software available?
nikitadnepr [17]

Answer:

GNU General Public License

Explanation:

The GNU's General Public License is the most popular open-source license around. Richard Stallman created the GPL to protect the GNU software from becoming proprietary, and it is a specific implementation of his "copyleft" concept.

7 0
3 years ago
I need to calculate the % of Grand Total on Microsoft Excel, but can't for the life of me remember how to do that. Help would be
vagabundo [1.1K]

Answer:

You need to first use the Sum function to add up all the costs of September.

Then divide each September cost by the grand total that you got. After that format the last column to be percentages.

Look at the attached file for the formulas used.

Download xlsx
4 0
3 years ago
Other questions:
  • Which of the following is the first step in a lockout-and-tag procedure? A. Place your lock on the breaker or switch. B. Sign yo
    12·2 answers
  • "what are two elements found in an email address?"
    7·1 answer
  • The top pane of the wireshark window, referred to as the __________, contains all of the packets that wireshark has captured, in
    5·1 answer
  • The process of sending ping requests to a series of devices or to the entire range of networked devices is called a:
    9·1 answer
  • Write a program of while loop 1234 get printed 4231
    7·1 answer
  • Write a function to prompt the user to enter the information for one movie (title, release date, mpaa rating and number of stars
    8·1 answer
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • Please tell fast plzzzzz​
    5·1 answer
  • What triggers a LinkedIn account ban?
    6·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!