1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
2 years ago
13

________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner

ability
Computers and Technology
1 answer:
Norma-Jean [14]2 years ago
4 0

Answer:

Hi there it is A vulnerability

Explanation:

You might be interested in
Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
kvv77 [185]

Answer and Explanation:

a)

For Go-Back-N:

  Host A sent total number of segments is 9.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2,3,4 and 5 because 2nd segment was lost.

Host B sent the number of ACKs are 8.Host B sent ACKs 1 by four times because 2nd segment was lost and sent 4ACKs with sequence numbers 2,3,4 and 5

selective repeat:

 Host A sent total number of segments is 6.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2 because 2nd segment was lost.

Host B sent the number of ACKs are 5.Host B sent four ACKs with sequence numbers 1,3,4,5 and re-sent ACK2 with sequence number 2 because 2nd segment was lost.

TCP :

Host A sent total number of segments is 6.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2 because 2nd segment was lost.

Host B sent the number of ACKs are 5.Host B sent four ACKs with sequence number 2 and There is one ACK with sequence number 6.TCP always send an ACK with expected sequence number

b) If the timeout values for all three protocol are much longer than 5*RTT,then TCP protocol successfully delivers all five data segments in shortest time interval.

 

4 0
4 years ago
6. You and your friends take an awesome selfie, and you add your name and addresses to the picture. It is a good idea to share t
Trava [24]

Answer:

family and friends you trust

3 0
3 years ago
Gabby is creating a game in which users must create shapes before the clock runs out. Which Python module should Gabby use to cr
igomit [66]
Uhh i think the answer is A
6 0
3 years ago
Read 2 more answers
Most case fans have standard _______________ connectors that are easy to plug in but can be forced to be connected the wrong way
SIZIF [17.4K]

Answer:

Molex

Hope this Helps!

4 0
3 years ago
A(n) ________ file contains data that has been encoded as text, using one of the computer's encoding schemes.
tangare [24]

Hello there

the answer is text

hope this helps

Queen Z

8 0
3 years ago
Read 2 more answers
Other questions:
  • Row array gameScores contains all player scores. Construct a row array highScores than contains all player scores greater than m
    15·1 answer
  • Your desktop computer monitor is not displaying a picture. What would you do to troubleshoot the problem?
    7·2 answers
  • What US federal agency publishes safety standards for business and industry?
    5·1 answer
  • Write a SELECT statement that returns a single value that represents the sum of the largest unpaid invoices submitted by each ve
    5·1 answer
  • Which of the following is used to move to end of the row?​
    8·1 answer
  • 2. What is the name for an action performed by the VR Robot?
    7·2 answers
  • How to design remote access policy using the appropriate access controls for systems,applications, and data access
    6·1 answer
  • Which feature helps an edit-test-bug cycle work faster in the python programming language?
    15·2 answers
  • Need help:(!!!! I’ll mark brainliest if correct
    5·1 answer
  • Why is computer called information processing machine ?????​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!