1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
2 years ago
7

what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each one o

f those packets independetly through the nextwork
Computers and Technology
1 answer:
aleksklad [387]2 years ago
8 0

Explanation:

These are the advantages of breaking up a single logical message into a number of fixed sized packets.

- When messages are broken into packets it increases the performance and also the reliability of the internet

- if there is an error in a single packet, this error is not going to affect the entire message.

- the efficiency of the communication line in the internet is improved.

- there is a reduction of traffic. Each packet in a single message can be transmitted through different routes.

- It reduces idleness as each packet can send from different program so each program has a service.

You might be interested in
Write an expression that will cause "greater or equal to -10" to print if the value of userNum is greater than or equal to -10.
Lilit [14]

Answer:

Expression for the above problem in python language:

userNum=int(input("Enter the value of user_Num")) #it is used to take input.

if(userNum>(-10)): #if statement

   print("The value of the userNum is greator")

elif(userNum==(-10)): #elif statement

   print("The value of the userNum is equal to -10")

else: #else statement.

   print("The value of the userNum is small")

Output:

  • If the user input is (-10), it will print equal.
  • If the user input 10, it will print greator message.

Explanation:

  • The above program or expression is in python language, where the first line is used to render a message to the user take the input and store it into a userNUM variable.
  • Then the second line is used to check the user num value to be greater with the help of if statement.
  • Then the third statement is used to check the user num value to be equal with the help of elif statement.
  • Then the else statement will execute when the if and the elif statement will not true.
6 0
3 years ago
An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.
Bumek [7]

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

4 0
3 years ago
How would you log in as zach if you did not know his password but knew the root password?
Nuetrik [128]
You can login in root terminal and then type #sudo Zach 
8 0
3 years ago
George wants to edit the font of the title in his presentation. Where can he find the option to edit it?
Bad White [126]

The answer could be B. Tool Bar

6 0
3 years ago
Read 2 more answers
What’s In
omeli [17]

Answer:

Explanation:

What’s In

The diagram below is a typical bungalow residential electrical wiring plan.

he kitchen and toilet, which are the most dangerous part of a house where

cooking and laundry appliances are located. It requires the installation of

which protect humans from danger. Replacement of C.O. or

installation of new GCFI needs electrical tool and equipment to be used based on the job requirement

7 0
2 years ago
Other questions:
  • Which of these is not a sub-claim "Our Clean Power Plan" uses to support its main claim? The CPP protects public health. The CPP
    13·2 answers
  • What is one way for an entrepreneur to decrease risk?
    8·1 answer
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • If you decide to get married, a trade-off would be that you have to give up being single.
    12·2 answers
  • Select the statement that best describes the function of the cell wall. O it gives shape to plants cells. O it produces food fro
    14·1 answer
  • Why is it important to record audio of silence in the area in which you are filming?
    12·2 answers
  • List the difference between GIGO and bug ​
    15·1 answer
  • Ayuda necesito 7 objetos que se utilizan en la vida diaria
    8·1 answer
  • A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!