1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
6

Pls help now the question is very hard someone help me pls​

Computers and Technology
1 answer:
satela [25.4K]3 years ago
4 0

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
You might be interested in
The command to get out of the loop.<br>a.<br>i exit<br>ii. break<br>iii. comment<br>iv. for​
Pavel [41]

Answer:

ii. break

Explanation:

In Computer programming, a loop can be defined as a sequence of instructions that are executed repeatedly until a specific condition is true or for a certain number of times.

This ultimately implies that, a loop is a programming structure that continually repeats a sequence of instructions until a specific condition is true (met) or for a definite number of times.

Basically, there are three (3) main types of loop in programming and these includes;

I. For loop.

II. While loop.

III. Repeat.

Since loops continually repeats a sequence of instructions until a specific condition is true (met), it is a best practice to ensure that the loop breaks at some point to avoid an infinite loop. An infinite loop typically causes a software program to crash.

Thus, the break command is used by programmers to prevent an infinite loop or terminate a current loop immediately.

Hence, the command to get out of the loop is break.

7 0
3 years ago
Which of the following are associated with Public Key encryption? (Select all that apply.) Question 2 options: a) Asymmetric key
tatiyna

Answer:

A- ASYMMETRIC KEYS

Explanation:

Assymmetric keys are public keys that are use for encryption. They are public keys which may be disseminated or share widely, they are usually know by everyone. The keys come in pairs in which what one key encrypts, only the other can decrypt.

Asymmetric keys allows someone to send their public key in an open and insecure channel.

3 0
3 years ago
Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
Alexandra [31]

Answer:

Explanation:

b

7 0
3 years ago
_____ are responsible for running and maintaining information system equipment and also for scheduling, hardware maintenance, an
Evgen [1.6K]

Answer:

System operators

Explanation:

This is a frontline which ensures the delivery of a reliable electricity to consumers. The duty of a system operator includes the following :manages the power grid from a set of computer console, determines the best combination of generators , investigates, plan and see to the demand and supply of power.

8 0
4 years ago
Patrick is working on a computer that is having wireless network connection issues. Patrick decides that he needs to take the la
Aneli [31]

Answer:

C

Explanation:

Please give me brainliest!

4 0
2 years ago
Other questions:
  • In a survey of 7200 T.V. viewers, 40% said they watch network news programs. Find the margin of error for this survey if we want
    6·1 answer
  • Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20
    8·1 answer
  • 5
    9·1 answer
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    15·2 answers
  • On laptops, wireless cards tend to be attached to which panel?
    11·1 answer
  • Consider the following code:
    5·1 answer
  • a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem​. I
    9·1 answer
  • Can anyone help and write a sample answer to this please x
    7·1 answer
  • Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
    12·1 answer
  • 1
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!