1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
2 years ago
14

See if you can do better then I did

Computers and Technology
1 answer:
never [62]2 years ago
8 0

Answer:

no i can't do better ggs

Explanation:

im not smart (also I did answer the question ;) )

You might be interested in
Mary is troubleshooting her company's LAN network. She finds out that data segments that the client is encoding are resulting in
kicyunya [14]

Answer:

Data link layer of OSI model is creating the erroneous segments

Explanation:

The Open System Interconnection (OSI) model is a conceptual framework about how communication occurs between devices over the Internet. It has seven layers, (Physical, Data, Network, Transport, Session, Presentation and Application layer). The purpose of this hierarchical layer system is to understand the structure of communication between devices and do troubleshooting easily if a fault occurs. As in this question, Marry is troubleshooting her company LAN network. She finds out that data segments that the client is encoding are resulting in errors in the encoding. Now the question arises, how she found the cause of the error. The OSI model helps her in understanding the problem.

As you know, the data link layer of the OSI model is responsible for the encoding and decoding of data segments. This layer ensures the reliability of the physical layer, and responsible to provide error-free transfer of data from one node to another on a network. It is also responsible for frame synchronization and flow control. The data link layer is divided into sub-layers:

1. Media Access Control Layer: this layer controls how a computer on the network gains access to the data and transmission permission.

2. Logical Link Control Layer: This layer controls frame synchronization, error checking and flow control.

Therefore, Marry founds data link layer of the OSI model is creating the erroneous segments in encoding.

6 0
3 years ago
Retype the paragraph with the corrections. There are 12 corrections. Look closely at the word and letter highlighted in yellow t
Artemon [7]

Answer:

Touch typing is a useful skill. It allows you to increase your typing speed and at the same time and reduces the number of errors you make. Touch typing makes you type faster and more efficient. You can be productive and complete your school assignments much quicker. Touch typing also allows you to type communication documents, like e-mails, in a fast and efficient manner. Most importantly, if you type properly then it will reduce repetitive injuries like carpal tunnel syndrome. There are many benefits of learning how to type correctly.

Explanation:

4 0
2 years ago
Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Ho
Ann [662]

Answer:

Yes, both of these segments (A and B) will be directed to the same socket at Host C .

Explanation:

Suppose both Host A and Host B each send a UDP segment to Host C with destination port number 6789, surely , both of these segments will be directed to the same socket at Host C .

Reason being that,  the operating system will provide the process with the IP details to distinguish between the individual segments arriving at host C- for each of the segments (A and B) recieved at Host C.

5 0
3 years ago
Mainframe computers are multi-programming, high-performance computers, and multi-user, which means it can handle the workload of
Vilka [71]

Answer:

a. True

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user. Computers can be classified on the basis of their size and capacity as follows;

I. Supercomputers.

II. Mainframe computers.

III. Mini computers.

IV. Micro computers.

Mainframe computers were developed and introduced in the early 1950s.

Mainframe computers are specifically designed to be used for performing multi-programming because they are high-performance computers with the ability to handle multiple users. As a result, it simply means that mainframe computers can be used to effectively and efficiently perform the work of over one hundred (100) users at a time on the computer. Some examples of mainframe computers include the following; IBM Es000 series, CDC 6600 and ICL39 Series.

Furthermore, mainframe computers are mostly or commonly used by large companies, business firms or governmental institutions for performing various complex tasks such as census, financial transactions, e-commerce, data sequencing, enterprise resource planning, etc.

8 0
2 years ago
Read 2 more answers
Two routers, R1 and R2, connect using an Ethernet over MPLS service The service provides point-to-point service between these tw
liberstina [14]

Answer: b) R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence.

.d) R1 will forward data link frames to R2 using an Ethernet header/trailer.

Explanation:

Here we have to understand what is MLPS. MLPS is a protocol which identifies the shortest route for the transfer of messages between routers instead of the longest route.

Here we are given a WAN which is a wide area network. Using layer 2 Ethernet service the frames are transmitted across the routers within the WAN.

Option A is incorrect as as connecting the other end of the cable to the R2 would reduce the functionality of the WAN.  Option C is incorrect as HDLC header trailer has no effect.

Option B and D are correct as Ethernet header/ trailer has the same size every frame and to maintain the functionality of the WAN one end must be connected to point of presence(PoP).  

5 0
3 years ago
Other questions:
  • A brick weighs 26 N. Measured underwater, it weighs 11 N.
    10·1 answer
  • You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do r
    14·1 answer
  • You need to delegate AD RMS responsibilities to a junior administrator. You don't want to give the administrator more permission
    14·1 answer
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • Which value can be entered to cause the following code segment to display the message: "That number is acceptable." int number;
    11·1 answer
  • Give 4 examples of mnemonic codes, and what do they do?
    15·1 answer
  • Exercise 3.6.9: 24 vs. "24"5 points
    7·1 answer
  • When power is completely removed from your computer
    11·1 answer
  • Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​
    11·1 answer
  • If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!