1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Iteru [2.4K]
3 years ago
14

The checksum doesn't compute for a packet sent at the Internet Protocol (IP) level. What will happen to the data?

Computers and Technology
1 answer:
DENIUS [597]3 years ago
6 0

Answer:

As the data computed in the form of modules such as 23456, then every sixteen positions will have the same values. Checksum doesn't cover all the corrupted data over the network, so unchecked corruption does not occur due to undetected technique.

Explanation:

The checksum is the error detection technique used to determine the integrity of the data over the network. Protocols such as TCP/IP analyzed that the received data along the network is corrupted. Checksum value based on the data and embed frame. The checksum used a variety of data and performed many types of data verification. Files include the checksum and check the data integrity and verify the data. Both Mac and Window include the programs and generate the checksum. But sometime checksum does not detect the error over the internet and cause unchecked.

You might be interested in
Who are all the fnaf characters?
vitfil [10]

Answer: Freddy Bonnie Chica Foxy Golden Freddy Endo 01 Toy Freddy Toy Bonnie Toy Chica Mangle Balloon Boy Marionette Withered Freddy Withered Bonnie Withered Chica Withered Foxy Withered Golden Freddy Shadow Freddy Shadow Bonnie Endo 02 JJ Phantom Freddy Phantom Balloon Boy Phantom Chica Phantom Foxy Phantom Mangle Phantom Puppet SpringTrap Nightmare Freddy Nightmare Bonnie Nightmare Chica Nightmare Foxy Nightmare Balloon Boy Nightmarionette Nightmare Nightmare FredBear Nightmare JJ Plushtrap.




Explanation: I can only tell you fnaf 1, fnaf 2, fnaf 3, fnaf 4

8 0
2 years ago
Discuss some design considerations that you should keep in mind when you want to design a professional-looking flyer or newslett
iogann1982 [59]
Designs on business flyers should be based on the business' theme and the message that it wants to communicate. <span>A sale should have a design that would attract customers with the discounts they can avail with their purchases. </span><span>
</span>Texts, colors, lines, shapes, and images are the elements that should be figured out depending on the kind of communication that a business would want to share. <span>
</span><span>A sale flyer uses big text to emphasize discounts. Advertising products with amounts should require friendly designs with short and clear-cut messages. Colors can also drive customers and associate it with the kind of product. </span>
3 0
3 years ago
Assume that x is a string variable has been given a value. Write an expression whose value is true if and only if x is an hexade
Lady bird [3.3K]

Answer:

import string

all(c in string.hexdigits for c in s)

Explanation:

The hexadecimal number system, often abbreviated as "hex", is a numeral system which consist of 16 symbols (base 16). The standard numeral system we are all use to, called decimal (base 10) and utilizes ten symbols: 0,1,2,3,4,5,6,7,8,9.

Using python programming language

import the  string module

the second expression iterate through the digit in s and confirm if they all are within the rage of 0 -9 ad A -F. If yes , it returns True and else, it returns false

6 0
3 years ago
What are some other features of sending attachments in Outlook 2016? Check all that apply.
Elis [28]

Answer:

the answer is a, b,d on edg.

Explanation:

8 0
2 years ago
Read 2 more answers
What type of document is a mobile device's EULA?
MakcuM [25]
EULA stands for End User License Agreement. This document is the contract between the software application author or publisher and the user of that application. It is also called "software license", because it establishes the purchaser's right to use the software on the mobile device. T<span>he user agrees to pay for the privilege of using the software, and promises the software author or publisher to comply with all restrictions stated in the EULA. </span>
6 0
3 years ago
Other questions:
  • For C++ (please make sure it runs properly)
    14·1 answer
  • If you work up to your potential but fall short of your goals, you
    15·2 answers
  • The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will fu
    9·1 answer
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • Celeste is writing a paper. However, two pages in, her computer shuts down unexpectedly. She never saved her paper, and all her
    12·2 answers
  • The term integration mean?
    7·2 answers
  • What is the fullform of ETA in computer term​
    15·1 answer
  • Nia is editing a row in an Access table. The row contains the Pencil icon on the left end of the record
    12·2 answers
  • c) If you are at foreign country visit, which banking card would you prefer to keep with you during visit (Debit Card or Credit
    10·1 answer
  • Besides a backup technician, who else would have encrypted backup passwords?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!