1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
13

The TCP congestion control measure techniques fall into two categories: retransmission timer management and ________ management

Computers and Technology
1 answer:
Paladinen [302]3 years ago
7 0

Answer:

Window management

Explanation:

In TCP congestion control, aside from retransmission timer management, the other category of technique is called WINDOW MANAGEMENT: this is carried out by the sender to end a link between the sender and the receiver to prevent overloading of too much traffic of bytes that can be sent in a given period.

Hence, in this case, the correct answer is WINDOW MANAGEMENT.

You might be interested in
When does the VB.NET programming environment start to operate?
drek231 [11]

Answer:

B. once a VB.NET project is created in the Microsoft Visual Studio environment.

Explanation:

Visual Basic . Net is a programming language which is used to run complex software and projects. The VB projects which are created in Microsoft Visual Studio are run by console application. These computer applications run complex and technical software.

5 0
4 years ago
Write pseudocode instruction to carry out each of thefollowing computational operations.
iVinArrow [24]

Explanation:

A. Pseudocode to determine the area of a triangle given value the base b andthe height h:-

START

INPUT b

INPUT h

COMPUTE Area = 0.5*b*h

DISPLAY Area

STOP

B. Pseudocode to compute the simple interest earned in 1 year given the starting account balance B and annual interest rate I :-

START

INPUT B

INPUT I

COMPUTE Interest = (B*I*1)/100

DISPLAY Interest

STOP

C. Pseudocode to determine the flying time between two cities given the mileage M between them and average speed of the airplane :-

START

INPUT M

INPUT S

COMPUTE Time = M/S

DISPLAY Time

STOP

6 0
4 years ago
Kenny needs to keep client information such as names and addresses. She should use a
Aneli [31]
Folder!
They cost like 97. Cents
5 0
3 years ago
Read 2 more answers
If your computer system is not working correctly, you can use System Restore to return the ___________ ____________ to an earlie
Luden [163]

You can use System Restore to return the computer file history to an earlier point in time.

Explanation:

System Restore allows you to recover documents/files that may have been deleted if your computer is not operating as it should be. Therefore, the answer is "computer file history".


Hope this helps!

7 0
4 years ago
2Discuss the difference between overriding and overloading. (This is a very common interview question in programming)
nordsb [41]

Explanation:

Following are the difference between overriding and overloading

(1) Method overloading means method having same name but different parameter or method signature Whereas  Method overriding means method having same name and same parameter or signature.

(2) Method overloading is achieved the compile time Polymorphism whereas Method overriding is achieved the Run time Polymorphism .

(3 ) In method overriding child class have facility to provide a specific implementation of a method which is already defined by parent class method whereas there is no such facility is available in method overloading

(4 )Programming structure of method overloading

class test

{

 void fun()

{

// statement

}

void fun(int b)

{

// statement

}

}

In this fun() method name is same but different signature I.e void fun() and void fun(int a);  

Programming structure of method overriding  

class parent

{

  void fun()

{

// statement in parent class

}

}

class child extends test

{

void fun()

{

// override the statement in child class

}

}

In this fun() method have same name and same signature in both class  

7 0
3 years ago
Other questions:
  • You are troubleshooting an IEEE 802.11 wireless client device that cannot connect to the wireless network. You notice the client
    14·1 answer
  • Kylie has created some code designed to keep track of information about employees at a company. The code will be used by the com
    6·1 answer
  • How are publishing used
    10·1 answer
  • The idea of supply and demand is based on the development of
    10·2 answers
  • Tanya wants to include an instructional video with all its controls on her office website. The dimensions of the video are as fo
    10·1 answer
  • Not every organization integrates with the Internet, but all use some or most of the technology that gave rise to it.
    15·1 answer
  • List 10 ways how can graphic design help the community
    13·1 answer
  • Cybersquatters:_________.
    5·1 answer
  • Write a function named count_vowels that accepts two arguments: a string and an empty dictionary. The function should count the
    10·1 answer
  • Submit a report outlining the steps you will take to obtain digital evidence. In your report you must include the legal requirem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!