1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
3 years ago
5

Which name is assigned to the transport layer pdu?

Computers and Technology
2 answers:
zheka24 [161]3 years ago
7 0

Answer:

i added answer for the other guy to get brainliest :) <3

Explanation:

12345 [234]3 years ago
4 0

Answer:

TCP segment

Explanation:

You might be interested in
U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
Ivan
The answer is "masquerade".
4 0
3 years ago
Which type of footwear should be worn while working on a hybrid vehicle?
Dmitrij [34]

Hello there!

Shoes with rubber souls would be the best bet.

7 0
3 years ago
Read 2 more answers
Phil wants to add a new video card, and he is sure the power supply is sufficient to run the new video card. But when he tries t
pshichka [43]

Answer:

Using a SATA to a 6 pin PCI-E adapter.

Explanation:

sometimes you may feel the need to make some upgrades to your computer, video cards are options where an upgrade is made, a 6 Pin PCI-E adapter is 6 pins 12V power adapter used to power a video card where their slots cannot provide them with enough power they require. in a situation where the card requires a lot of power than the slot can provide, 6 pins PCI-E adapter is a very good option.

4 0
4 years ago
Which is the best information to determine an athlete's abilities and needed areas of improvement?
katen-ka-za [31]

Answer:

4

Explanation:

7 0
3 years ago
Read 2 more answers
What are sums of money that are given out for specific reasons?
xenn [34]

Answer:

a

Explanation:

6 0
4 years ago
Read 2 more answers
Other questions:
  • Dinah is using an I.D.E to write, modify, and save code. Which tool should she use?
    8·2 answers
  • In which type of attack do you get malicious code in links from seemingly reliable websites?
    14·1 answer
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • Write a program that reads two fractions such as 1/2 and 1/4 and computes and stores the sum, the difference, the product and th
    15·1 answer
  • What unit is used to describe the smallest amount of bitcoin?
    13·1 answer
  • Chapter 8 discusses five principles for making a graphic clear and understandable. One principle is that the graphic should have
    11·1 answer
  • Given the statement: int list[25]; The index can go from 0 to 25 inclusive withoutgoing beyond the end of the array.true or fals
    14·1 answer
  • What is TSM Hamlinz’s discord
    6·2 answers
  • Write a program Using loops to display the following patterns –
    11·1 answer
  • Which sentence describe internet safety precautions?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!