1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sattari [20]
3 years ago
12

Which is a connectionless protocol in the transport layer? What are the small chunks of data called?

Computers and Technology
2 answers:
xeze [42]3 years ago
6 0

Answer:

User Datagram Protocol (UDP) , transport-layer segment.

Explanation:

The User Datagram Protocol is popularly known as UDP. It is defined as the communication protocol which is used across the internet for any time sensitive transmission like the DNS lookup or the video playback.

The UDP provides a unreliable and connectionless service to a invoking application.

The transport layers on sending side converts the application $\text{layer }$ messages which it $\text{receives}$ from the $\text{sending application process}$ into a transport layer segment called as the transport layer segments. This is achieved by breaking down the application messages into a smaller chunks and then adding the transport layer header into each chunk so as to create a transport layer segment.

slava [35]3 years ago
3 0

UDP and the small chunks of data are called packets

You might be interested in
How many different bit strings are there of length 6 that contain the string 0000?
Elena L [17]

Answer:

It can be 100001, 100000,000001,000000

Hence, answer is 4.

its also can be found through 2C2 *2 = 2!/0! *2 =2*2 =4

Explanation:

The answer is straight forward, we have 2 empty places and we can select from 2 items, and hence its 2C2, and now we can arrange them as well, and since we can arrange in 2 ways, hence a total number of possibility = 2 * 2C2 = 4, which is the required answer.

5 0
3 years ago
Point: A Point in a two dimensional plane has an integer x coordinate value and an integer y coordinate value.
UNO [17]

Answer:

They are connected

Explanation:

8 0
3 years ago
Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
DIA [1.3K]
Configure terminal because Commands in this mode are written to the running configuration file as soon as you enter them (using the Enter key/Carriage Return). After you enter the configure terminal command, the system prompt changes from switch# to switch(config)#, indicating that the switch is in configuration mode.
7 0
3 years ago
Suppose that the UDP receiver computes the Internet checksum for the received UDP segment and finds that it matches the value ca
defon

Answer:

No, the receiver cannot be absolutely certain that no bit errors have occurred. This is because of the manner in which the checksum for the packet is calculated. If the corresponding bits (that would be added together) of two 16-bit words in the packet were 0 and 1 then even if these get flipped to 1 and 0 respectively, the sum still remains the same. Hence, the 1s complement the receiver calculates will also be the same. This means the checksum will verify even if there was transmission error

Explanation:

4 0
4 years ago
Hy plzz help me friends​
timama [110]

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • If your TV was showing a flat black or blue screen, or had "snow", what steps would you take to fix it?
    11·1 answer
  • ____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
    8·1 answer
  • If Phil is putting exact phrases in quotation marks while searching for information, he's using which of the following?
    14·1 answer
  • Which item is most likely to be a standard part?
    14·1 answer
  • __________ is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help ma
    6·1 answer
  • Insufficient vacuum will require the driver to _______________ to adequately activate the brakes?
    13·1 answer
  • Which of the following representations in two's complement notation represents the largest value?
    12·2 answers
  • Write a python program to calculate the average of two numbers​
    8·1 answer
  • Which structure does a web page normally use to define an area of focus <br>​
    9·1 answer
  • What is this on G00gel Documents , how do I fix it?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!