1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sattari [20]
2 years ago
12

Which is a connectionless protocol in the transport layer? What are the small chunks of data called?

Computers and Technology
2 answers:
xeze [42]2 years ago
6 0

Answer:

User Datagram Protocol (UDP) , transport-layer segment.

Explanation:

The User Datagram Protocol is popularly known as UDP. It is defined as the communication protocol which is used across the internet for any time sensitive transmission like the DNS lookup or the video playback.

The UDP provides a unreliable and connectionless service to a invoking application.

The transport layers on sending side converts the application $\text{layer }$ messages which it $\text{receives}$ from the $\text{sending application process}$ into a transport layer segment called as the transport layer segments. This is achieved by breaking down the application messages into a smaller chunks and then adding the transport layer header into each chunk so as to create a transport layer segment.

slava [35]2 years ago
3 0

UDP and the small chunks of data are called packets

You might be interested in
Draw the Abstract Syntax Trees for the following statements and represent them in text form. i) 1+2+3 ii) 6÷3×4+3
MArishka [77]

Answer:

your a legend you can do it just pleave

Explanation:

:)

5 0
3 years ago
A bag of biscuit can hold 22 biscuit, and a container can hold 70 bags of biscuit. Write a program that prompts the user to ente
Marta_Voda [28]
The answer is left over bags that make turtles sick
5 0
3 years ago
Read 2 more answers
An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m
klio [65]

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

4 0
3 years ago
An analyst suggests that the lower the number of clusters, would give us the strongest and most meaningful result, as opposed to
WARRIOR [948]

Answer:

a. True

Explanation:

Various studies have shown that this is true. Clusters allow you to group together large sets of data into smaller groups in order to find similarities between all the data. Having a smaller number of clusters has been proven to allow you to discover much simpler similarities which can have a much greater impact. Larger sets can help in discovering more unique similarities but they do not have as large of an impact and are less meaningful. This is also why it is recommended to have a lower number of clusters when analyzing data sets.

4 0
3 years ago
What is the character that seperates data entries from one another.
Kazeer [188]
The term that would best be applicable to the character that divides entries from one another for convenience would be a delimiter. In addition, these delimiters comprise sequences in which they are intended to indicate a boundary between regions of independent data streams and other texts.
4 0
3 years ago
Other questions:
  • Which of the following are examples of software? Check all of the boxes that apply.
    12·2 answers
  • What is the advantage of using a high-level language over machine language for writing computer programs?
    12·2 answers
  • Mary needs to choose the menu in order to place the text in a desired fashion around the image.
    14·2 answers
  • What is "the last mile of broadband access"? Why is this a problem and what kind of impact does it have on the business world an
    9·1 answer
  • Distinguish between exponentiation and modulus. Be specific.
    5·1 answer
  • Match the job description to the level of degree it requires.
    15·1 answer
  • Design a program that asks the user to enter a string containing a series of single digit numbers with nothing separating them.
    7·1 answer
  • The blue section of the following Venn diagram could represent which of the following Boolean statements?
    14·1 answer
  • 6.- Escribe un ejemplo donde se utilice un sistema de información
    12·1 answer
  • Forgot this website exsited wsp
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!