1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
2 years ago
7

what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each one o

f those packets independetly through the nextwork
Computers and Technology
1 answer:
aleksklad [387]2 years ago
8 0

Explanation:

These are the advantages of breaking up a single logical message into a number of fixed sized packets.

- When messages are broken into packets it increases the performance and also the reliability of the internet

- if there is an error in a single packet, this error is not going to affect the entire message.

- the efficiency of the communication line in the internet is improved.

- there is a reduction of traffic. Each packet in a single message can be transmitted through different routes.

- It reduces idleness as each packet can send from different program so each program has a service.

You might be interested in
Hey plz help me with this<br>What is malware short for?​
soldier1979 [14.2K]

Answer:

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers.

Explanation:

4 0
2 years ago
By converting a given collection of tables to an equivalent third normal form collection of tables, you remove any problems aris
dolphi86 [110]

Answer:

The answer is "functional".

Explanation:

It's a relation of two attributes, usually between the primary key and other main attributes of a table. It turns the collection of tables into a third standard table array.

  • It allows you to controls the quality of data into the database.  
  • It is the disparity between the positive and weak architecture of the database plays a crucial role.

4 0
2 years ago
(50 points) What animes should I watch?
Eddi Din [679]

Answer:

naruto,naruto shippuden and baruto

Explanation:

3 0
3 years ago
Read 2 more answers
HELPPPPPPP!!!!!!!!!
Andrei [34K]
The compression ratio is 20:1 please mark me brainliest
3 0
2 years ago
Why isn't 802.1X a good choice for home based wireless networks
Sholpan [36]
It can possibly cause an issue with the authenticator's end. Its capacity has a limited memory capacity and has the minimal processing power. Most of the process will be at the supplicant and authentication servers. However, the 802.1X has a better security compared to the WEP.
6 0
3 years ago
Other questions:
  • The application layer in the tcp/ip protocol suite is usually considered to be the combination of ________ layers in the osi mod
    12·1 answer
  • What is the definition of a server?
    11·1 answer
  • What do the letters of the su command stand for? what can you do with su besides give yourself root privileges? "what can you do
    5·1 answer
  • How is a cell named?
    12·1 answer
  • This program has some errors in it that are needed to be checked import java.io.*;
    13·1 answer
  • Ruben is helping his team choose a leader. Of the people Ruben is considering, which one has qualities most related to being an
    5·2 answers
  • Which line in the following program will cause a compiler error?
    9·1 answer
  • What is the problem, if any, with the following code?The desired output is [3,19].
    13·1 answer
  • Can someone help me asap​
    13·1 answer
  • What can you use to make sure that you have no errors in Word Online?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!