1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
15

Bao bì chủ động active packaging và bao bì thông minh intelligent packaging khác biệt như thế nào

Computers and Technology
1 answer:
Zielflug [23.3K]3 years ago
3 0

answer:

yes....................

You might be interested in
Which programming language's program structure is similar to its syntax?
sashaice [31]

Answer:

I believe it is java.

Explanation:

8 0
3 years ago
Select all True statements! Question 1 options: a) Host A is sending Host B a large file over a TCP connection. Assume Host B ha
VikaD [51]

<u>Solution:</u>

a)   False. Piggyback is used only for efficiency. If there's no data packet to be piggybacked to, then B will just send the acknowledgement packet.

b)  False. It is the size of the receiver's buffer that's never changed. RcvWindow is the part of the receiver's buffer that's changing all the time depending on the processing capability at the receiver's side and the network traffic.

c)  The given statement is True.

 d) False. The sequence number of the subsequent segment depends on the number of 8-byte characters in the current segment.

e)  True. Every TCP segment has a current value of rwnd in the receive window.

f)  False. Next_RTT = alpha * last_estimated_RTT + (1-alpha)*newly_collected_RTT_sample. In this case even though the last sampleRTT which is the newly_collected_RTT_sample is 1sec, the next_RTT still depends on alpha and last_estimated_RTT. Therefore, the next_RTT is not necessarily greater than 1sec.

g) False. The acknowledgement number has nothing to do with the sequence number. The ack. number indicates the next sequence number A is expecting from B.

5 0
4 years ago
Which two Operating system include bitelocker
lisov135 [29]

Answer:

BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining (CBC) or XTS mode with a 128-bit or 256-bit key.

8 0
4 years ago
Which data type could be used for the field, remark or comment? ​
katrin2010 [14]

Answer:

While CLOB/NCLOB types may seem attractive, they are not nearly as efficent as [N]VARCHAR for most of the functions you would usually want to run on them, and anyone who can't comment in 2000 or 4000 characters isn't likey to generate a comment you'd want to use anyway.

copied from google

hope that helps

3 0
3 years ago
What in the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless tech
dem82 [27]

Answer:

The ethernet protocol IEEE 802.3 is only meant for cable networks.

Explanation:

In this scenario, there are two types of networks, namely;

LAN and WLAN.

A LAN (local area network) is a network within a small area like a  building, i which its workstation are connected using cables. The cabled network instantly use a protocol called Ethernet also known as IEEE 802.3.

WLAN (wireless local area network) is a small area network just like the LAN, but the difference is that its workstation are connected wireless (without cable). wireless networks uses wifi or 802.11a/n/g to connect to the network.

So, the ethernet protocol represents the cabled network, Wifi represents the wireless network.

8 0
3 years ago
Other questions:
  • If you want three vertical sections of text on your page, create _____.
    11·2 answers
  • If a ≤m b and b is regular, does that imply that a is a regular language? why or why not?
    6·1 answer
  • The main activity area or the brain of the computer is called the ________
    15·1 answer
  • The __________ clash of clans and candy crush saga are video games that exploit the real world–digital world convergence by buil
    10·1 answer
  • What is DBMS software used for?
    5·1 answer
  • Among the rights you have as a user of computing resources is the right to​ _______.
    12·2 answers
  • 3. Output the following:<br>a.<br>21%4​
    12·1 answer
  • Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
    15·1 answer
  • You recently discovered that several key files of your antivirus program have been deleted. you suspect that a virus has deleted
    9·1 answer
  • What is the indication when a student conducting an electronic search of the literature is simultaneously using two databases, p
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!