1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sattari [20]
3 years ago
12

Which is a connectionless protocol in the transport layer? What are the small chunks of data called?

Computers and Technology
2 answers:
xeze [42]3 years ago
6 0

Answer:

User Datagram Protocol (UDP) , transport-layer segment.

Explanation:

The User Datagram Protocol is popularly known as UDP. It is defined as the communication protocol which is used across the internet for any time sensitive transmission like the DNS lookup or the video playback.

The UDP provides a unreliable and connectionless service to a invoking application.

The transport layers on sending side converts the application $\text{layer }$ messages which it $\text{receives}$ from the $\text{sending application process}$ into a transport layer segment called as the transport layer segments. This is achieved by breaking down the application messages into a smaller chunks and then adding the transport layer header into each chunk so as to create a transport layer segment.

slava [35]3 years ago
3 0

UDP and the small chunks of data are called packets

You might be interested in
Greyer Corp, manufactures surgical instruments. Systems Medico Inc. enters into a contractual arrangement with Greyer that allow
hammer [34]

Answer: Licensee

Explanation:

Licensee is defined as the person who holds the licence after receiving it. He/she is known as license holder who receives it from the licensor. Licensee has the official right and permit to use a service or good.

According to the question, Greyer Corp. is granting the license to System Medico as a licensor so that they can indulge with them to manufacture and sell surgical tools.

For this agreement ,System Medico is paying a yearly fee in the form of permit (license) to access the services of Greyer Corp along with the agreement in the form of licensee

8 0
3 years ago
Can the redirection shell metacharacter be used to redirect between a command and another command?
Maksim231197 [3]
The answer is NO it cannot.
5 0
4 years ago
Why would you use a topic web?
sergejj [24]
<span>A topic web is commonly used to expand the subject of your research paper. It is a tool to help researcher for a flexible framework of developing ideas, information and its relationships between concepts. Moreover, it is a brainstorming strategy where the subject will be link to the supportive ideas or details that would improve fluency of topic. </span>
7 0
4 years ago
Read 2 more answers
Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
vodka [1.7K]

Answer:

Link manipulation

Explanation:

With the link manipulation the phisher manipulate the URL link, in this case, the URL can seem similar to an original website, but this link sends you to a fake website, and you enter for example your bank or personal information, the phisher use this data to steal money or delicate data, sometimes these links are sent by email or text messages.

4 0
4 years ago
Letters, memos, and computer printouts of numerical information are examples of formal reports.Group startsTrue or False
kati45 [8]

Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement.

<h3>What are  formal reports?</h3>

Formal reports are known to be a type of report that has elements such as a title page, a transmittal, a table of contents, etc. An example are:

  • Inspection Report.
  • Safety and Health Report.

Conclusively, Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement because  they are all examples of informal reports.

Learn more about formal reports from

brainly.com/question/11599232

6 0
3 years ago
Other questions:
  • What are strategies that you can use to yield web sites that are relevant to your research topic?
    13·1 answer
  • List and describe the issues that lead to making a successful website?​
    9·1 answer
  • What sequence is used to create a brochure document from a template?
    8·2 answers
  • For activities with output like below, your output's whitespace (newlines or spaces) must match exactly. See this note. Jump to
    15·1 answer
  • When you first launch the internet, what page will open?
    9·1 answer
  • Which of the following makes a virtual tour different from a printed map
    6·2 answers
  • Using simplified language and numbers, using large font type with more spacing between questions, and having students record ans
    9·1 answer
  • Which term originated on social media?<br> O A. LOL<br> O B. Unlike<br> O C. Notebook<br> D. Word
    7·2 answers
  • Why do guys get jealous when u hangout with another guy that's not them
    6·2 answers
  • write a loop that reads positive integers from standard input, printing out those values that are greater than 100, each followe
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!