A <u>sequence</u> number is a 32-bit number that's used to indicate where you are in a sequence of TCP segments.
<h3>What is TCP?</h3>
TCP is an acronym for Transmission Control Protocol and it is an essential and important standard protocol of the Internet protocol network.
In Computer technology, TCP is an essential part of the transmission control protocol and internet protocol (TCP/IP) network which has a wide range of applications in the following areas:
In TCP segments, a <u>sequence</u> number is a 32-bit number that's typically used to indicate where an end user is in a sequence.
Read more on TCP here: brainly.com/question/17387945
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
int n;
double average,sum=0,x;
cout<<"enter the Value of N:";
// read the value of N
cin>>n;
cout<<"enter "<<n<<" Numbers:";
// read n Numbers
for(int a=0;a<n;a++)
{
cin>>x;
// calculate total sum of all numbers
sum=sum+x;
}
// calculate average
average=sum/n;
// print average
cout<<"average of "<<n<<" Numbers is: "<<average<<endl;
return 0;
}
Explanation:
Read the total number from user i.e "n".Then read "n" numbers from user with for loop and sum them all.Find there average by dividing the sum with n.And print the average.
Output:
enter the Value of N:5
enter 5 Numbers:20.5 19.7 21.3 18.6 22.1
average of 5 Numbers is: 20.44
They can work and talk with customers and see what customers want and tailor to some of the customers need. Ask for feed back and reviews and customers will be more likely to shop again if they feel the business cares what they think.
The Answer Is An Output Device
Answer:
Hacktivists
Explanation:
Hacktivists are individuals who gain unauthorized access to computer networks or information, then use unruly ways to effect social or political change. Hacktivism started as a way of protesting online to effect a change by pushing for a certain outcome. This saw the building of websites such as wiki leaks. Although hacktivists are not entirely driven by malicious intent they employ some tactics used by hackers to drive their message across.