1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
9

Helllllllllppppppppppp

Computers and Technology
1 answer:
solong [7]3 years ago
5 0

Answer:

9

Explanation:

"++" at the beginning increases your "x" by 1 before using it.

if it placed after your variable, it will increase it after your program used it.

You might be interested in
A TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends another 160 bits of
Tatiana [17]

Answer:  2140 bits.

Explanation:

In order to traverse the first network, the Data Link Layer builds a frame, which adds a 24-bit header to the IP datagram, which has 1820 bits (1500 bits of TCP data + 160 bits of TCP Header + 160 bits of IP Header).

When the frame arrives to the router that interconnects the two networks, the network layer is informed that the MTU for the destination network, is 800 bits only.

So, as the maximum size for a frame in the destination network must be 800 bits (including the 24-bit header), the IP protocol must fragment the original 1820-bit datagram, in a way that any frame have at a maximum 800 bits.

So the IP datagram is fragmented in 3 datagrams, two of them with 760 bits each (600 from the TCP segment + 160 bits from the IP Header), and a last one, with 620 bits (460 bits from the TCP segment + 160 bits from the IP Header).

All the datagrams are completed adding the 24-bit header to build frames that traverse the destination network until they reach to the final destination.

After stripping the 24-bit header, the frames (that became datagrams), arrive to the network layer protocol, divided in 3 fragments, one of 620 bits and two of 760 bits, with a total of  2140 bits, which, once reassembled, will become the original 1500 bits + 160 bits header of the TCP segment, after stripping the IP headers.

6 0
3 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
Sati [7]

Answer: Logical Point Blocking

Explanation:

4 0
1 year ago
.____________ is a way to identify and differentiate goods andservices through use of a name or distinctive design element.
padilas [110]

Answer: Brand

Explanation:

A brand is a way to identify and differentiated the good and services as, brand is the process, which is used for the business and the marketing strategies. Basically, it is used as communication method for distinguished the products and the company for creating the good impression for customers. Brand awareness and management is the main key components.  

3 0
4 years ago
what is the first step in necessary to begin setting up a website once a host has been selected and paid
kenny6666 [7]

explain this more please..

6 0
4 years ago
Read 2 more answers
Other questions:
  • Race conditions are possible in many computer systems. Consider a banking system with two methods: deposit(amount) and withdraw(
    14·1 answer
  • Which quality is likely to ensure consistent career growth in the computer field?
    9·2 answers
  • The part of a rocket engine that allows the combustion gases and flames to leave the rocket engine is the
    14·1 answer
  • 3.
    5·1 answer
  • Pls help computer science I will give brainliest
    8·2 answers
  • _________________ component defines the correct granularity for access controls and oversees the relationships between identitie
    13·1 answer
  • Character positions in<br> arrays start counting with<br> the number 1.<br> True<br> False
    14·1 answer
  • The =COUNT function calculates what value?
    15·2 answers
  • What are some recent inventions that have improved the quality of your life?
    10·1 answer
  • Who benefits the most from billing by the second for cloud resources, such as virtual machines?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!