Answer:
Explanation:
From the given information;
We will like you to understand that the source port numbers and destination port number can be any number. For that reason, the ones being used here will just be examples.
NOTE:
That the destination port numbers sent from A to S and B to S are the same in their segments.
That the destination port numbers sent from S to A and S to B are the same in their segments.
From A to S, the segment sent possibly could have the source port number 467 and destination port number as 23(Telnet)
From B to S, the segment sent possibly could have the source port number 513 and destination port number as 23(Telnet). 
From S to A, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 467.
From S to B, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 513.
Yes, it is possible. This is because the inclusion of  IP in the segments is to recognize the host. 
No, the source ports will be different. Because source port number from A to S can't be the same from B to S at the time they are in the same host.
 
        
             
        
        
        
Answer:
The PST file format can only be imported into contacts by the outlook
program.
The CSV file type can be created from a document or spreadsheets
and can be imported by multiple email programs.
Explanation:
 
        
                    
             
        
        
        
Frank who want to install a software program on a single server with multiple users connected should consider cloud computing. This type of computing delivers convenient, on-demand, pay-as-you-go access for multiple customers to a shared pool of configurable computing resources, which is exactly what Frank needs.
 
        
                    
             
        
        
        
Answer:
Follows are the matching to this question:

Explanation:
While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.