Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission?

Answers

Answer 1

Answer:

The protocol will drop the packets

The application will automatically re-transmit the packets

Explanation:

Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum

Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.


Related Questions

Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions

Answers

Answer:

To enable VI editor automatically display lines as numbered, the following steps must be taken:

Step 1: Press the Escape key to exit the insert or append mode.

Step 2. Press the colon key to trigger the cursor. The cursor will appear at the lower-left position of the screen next to a : prompt.

The Next step is to type the following command: set no number hit the enter button to execute the command. This will trigger a column of sequential line numbers will appear at the left side of the display. Each line number references the text located directly to the right of it.

Step 3: To enable this to happen automatically, the appropriate set statement as a line in must be inserted a file in your home directory named .exrc

Cheers!

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function

Answers

Answer:

"Transport" is the correct answer.

Explanation:

Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.

So that the above would be the correct approach.

"What is the longest time (with extensions) a developer can have to file a final map after receiving tentative map approval?"

Answers

Answer:

The answer is "Five years (Two years)".

Explanation:

It supplies with proactive maps of approved modifications beyond the limits of plan may be expanded by the submission of final maps, reflecting the stages of the initial proactive plan, up to ten years with both the chief administrator.

Its provisional submission of a map, that will include the request forms or other resources provided at the request of the city administrator and the office.  It also allows the phasing for the current map, that has been accepted.

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?a. /23b. /24c. /27d. /28

Answers

Answer:

The answer is "Option c"

Explanation:

In the given question only option c is correct because "/27" is the IP "255.255.255.224" is the same as "/27" in the terminology in CIDR, in which it uses the compact IP address as well as corresponding prefix expression and it terminology consists of an IP with a slash ('/') or a decimal number. Its count of 1-bit proceeding to the mask traditionally referred to it as the network mask.

some of y'all make me lose braincells with your questions

Answers

Answer:

ok done we will try

BTW have a nice day enjoy your day Stay blessed stay happy stay strong

When your brain undergoes sensory deprivation for longer periods of time, you lose brain cells. When cells are not stimulated for long periods of time, your brain reorganizes itself; you naturally lose the unused, understimulated cells.

Discuss three ways in which errors can arise in developing and executing linear optimization models in business situations, and indicate some of the business consequences of such errors. Explain how analytics professionals can help to prevent such errors.

Answers

Answer:

The following are the three-way, in which errors arise and, the process to solve them.

Explanation:

The mistake is something you did, that could not be incorrect. It may consider errors when creating and implementing simulation models in business situations because of some procedure problems. It is not because of bemusement and a few of the other error types were also acceptable even though the correction is affordable.

Type 1 error:  This type of error arises due to limited accuracy issues, in this the gadgets or devices used for the simulation study, quantitative measurements. These errors Often simplified in expectations. It is a concept for analysis, in which experts firstly understand this kind of mistake.  Type 2 error:  These errors may occur due to inaccuracy. If another analytic method behaves differently for two analysts. It tends to cause errors, that are unrecognized by no pre-defined methods for fixing those errors. Type 3 error:  These issues can be reduced by the improper selection of software, and in the implementation period, it can consider this sort of error due to the failure of system integration tools.

How do we explain the difference between fake news and facts​

Answers

Answer: it depends if the news is on the news and someone rights an article about it and says some mislead details that's how u know its fake  

Explanation:

What is computer Network?​

Answers

Answer:

[tex]\boxed{\sf {view \: explanation}}[/tex]

Explanation:

A computer network is a network of computers that can share data among the computers.

Which rule should be followed to stay safe online?
O Keep inappropriate messages private.
O Avoid sharing photos with anyone online.
O Keep screen names private.
Ask an adult for permission to download.

Answers

Answer:Avoid sharing photos with anyone online.

Explanation:in other to stay safe on the internet avoid sharing of your pic to strangers most especially pic with inappropriate dressing.... You can be manipulated.....

Answer:

B

Explanation:

PLS HELP ME WITH MY PYTHON HW

Answers

Answer:

name=input('What is your name?')

age=input('What is your age?')

school=input('What is your school?')

print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')

age=int(input('What is your age?'))

if age > 10:

 print('You are a teenager')

for x in range(10):

 print(name)

country='United States or America'

print(country[17:24])

a_list = [0, 2, 4, 8]

maximum = max(a_list)

print(maximum)

minimum = min(a_list)

print(minimum)

numbers = [1, 3, 4, 2]

numbers.sort()  

print(numbers)

Define:-

Absorption law ​

Answers

Answer:

Absorption law is an identity linking a pair of binary operations. 

Hope it helps you.

DONDE PUEDO VER LA HABITACIÓN EN ROMA?? ONLINE SIN PAGAR (ES UNA PELI)

Answers

Answer:

Sorry, Room in Rome is not available on Indian Netflix, but you can unlock it right now in India and start watching! With a few simple steps you can change your Netflix region to a country like Japan and start watching Japanese Netflix, which includes Room in Rome

Lo sentimos, Room in Rome no está disponible en Netflix indio, ¡pero puedes desbloquearlo ahora mismo en India y empezar a mirar! Con unos simples pasos, puede cambiar su región de Netflix a un país como Japón y comenzar a ver Netflix japonés, que incluye Room in Rome.

Your computer science teacher asks you to sample a black and white image that is 4" x 6". How would you sample the image to provide a good digital approximation using the pixelation widget? What sample size would you use? How would your decision affect the digital representation?

Answers

Answer:

The largest dimensions we can make of an image with the pixelation widget is 255*255.

When an image is resized, the number of pixels in the image may be reduced or increased, which causes the image to be resampled. Resampling changes the file size.

Explanation: This is all I could find. I hope its helps Sorry.

The sample size that would provide a good digital approx. will be  255 x 255

When resizing images using the pixelation widget, the pixels of the image will either reduce or increase and the reduction/increase in the pixels will have an effect ( blurry effect ) on the image when viewed by the user.  also

when an image is resized the size of original size is either larger or smaller than the resampled image.

Hence to provide a good digital approx. using the pixelation widget from an image 4" x 6" is by using a sample size of 255 x 255

Note : A picture showing the effect of pixelation is attached below

learn more : https://brainly.com/question/19038576

You find a list of websites that relate to your chosen topic and click on the first one. You ask yourself the three questions presented in this lesson to see if this site is reliable: 1) Who wrote it? There isn't an author listed anywhere that you can find. 2) What type of site is it? The site name ends in . 3) How current is the information? You see the site was updated yesterday. Is this website reliable and worth examining further? True or False?

Answers

Answer:

False

Explanation:

Information reliability is essential in production. sourcing information from a reliable source is base on several criteria. They are; the author of the resource file, the type of media platform holding the information, the frequent revision of the information, additional support or collaboration to publish public information, etc.

A government website ( with the site-address ending with a '.gov' ) which is concurrently revised by the institute, gives a piece genuine and reliable information, whereas a commercial website with no author and just recently revised or published, would be judged as an unreliable source of information

You administer computers on a Microsoft Windows 2003 TCP/IP network. On the network, you want to use a domain name-to-Internet Protocol (IP) address name resolution system that provides a central database on a server to resolve domain names to IP addresses. Which options should you implement on your network

Answers

Answer:

The answer is "Using the Domain Name System(DNS)".

Explanation:

It is the name database whereby web domain names were located or converted into their IP addresses. Its domain name maps its username used by users and finds a site at a user's IP range for the location of a site.  

It includes the internet and also has  DNS for any time search on the internet if they know this or not. It should recall the IP address of every device to access on the specific web site which you needed, that's why we can say that the DNS is used to implements on the internet.

Joshua needs to store all of his music (over 2 GB), his movies (4GB), and his pictures (1GB). He wants to be able to access his media wherever he goes. He needs a cheap storage solution. Which type of storage would be best for Joshua?

Answers

Answer:Cloud storage

Explanation:I think that the cloud storage would be his best choice, because there are free cloud storages for use and all you need is access to the internet to upload or download files from them.

What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders
What are responsibilities of employees? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders.

Answers

Answer:

The correct options are;

1) To own businesses

To be responsible to employees

2) To work for companies

To be responsible to stakeholders

Explanation:

The entrepreneur is responsible for setting up and managing the establishment as well as provision of motivation for the employees. The entrepreneur gives direction and vision to the business which the employees follow, and as such the entrepreneur is responsible for being laudable and dependable and consistent

The employees are responsible for the work they do for the companies is done in a safety and healthful to them

The employees are responsible for the health and safety of other stakeholders for their actions and in-actions and to cooperate with the safety efforts of the employer

Answer:

to own business, to be responsible for employees, to work for companies.

Explanation:

As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she checked last week. This surprises her, since she didn't make any changes to her TCP/IP configuration. The user has had no problems running her web browser. You immediately know that:

Answers

Answer:

D. Her computer is a DHCP client.

Explanation:

Since in the question it is mentioned that IP address is different as compared in the previous week also the user did not make any changes with respect to the TCP/IP configuration and the system is working well

So this situation represents that the user computer is a client of DHCP as it deals with the client-server protocol in which it automatically generates the IP i.e Internet protocol along with the IP address

Hence, the correct option is d.

Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!

Answers

Answer:

Software Program Reinstallation

Use the following steps to reinstall factory installed software programs:

Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.

Figure : Recovery Manager

Recovery Manager main screen

Under I need help immediately, click Software Program Reinstallation.

On the Software Program Reinstallation welcome screen, click Next.

Look in the Factory installed programs list for the software program you want to reinstall.

If your software program is listed, select the title.

If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.

Figure : Select program to reinstall

Software Program Reinstallation window

Click Next.

If you are not prompted to uninstall the program before reinstalling it, continue to the next step.

If you are prompted to uninstall the program before reinstalling it, follow these steps.

Click Start (), and then Control Panel.

Under Programs, Uninstall a program.

The Uninstall or change a program window opens.

Figure : Uninstall or change a program

Uninstall or change a program screen

Select the program you want to remove.

Click Uninstall or Uninstall/Change at the top of the program list.

Read and respond to any messages that appear while the software is being removed from your computer.

Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.

When the reinstallation is complete, select Yes, and then Finish to restart the computer.

________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing. A) agility B) flexibility C) responsiveness D) IT consumerization

Answers

Answer:

The correct option is;

A) Agility

Explanation:

Business agility is a measure of the responsiveness of business to business opportunities that is the time lapse between the emergence of a business opportunity and the the business formerly responding to the opportunity.

By similar analogy, IT agility is about the responsiveness of an organizations IT infrastructure to external stimuli. As such IT agility measures the systems adaptability to change (which may involve scaling down) or how easily it is for the IT system to be able to produce new transferable opportunities which involves scaling up as needed.

Yara needs to provide step-by-step instructions to her staff on how to use a new system for
conducting performance reviews. What is the best tool for communicating this information?
A) Spreadsheet
B) Email
C) Direct messaging
D) Slides

Answers

Answer:

D) Slides

Explanation:

A slide is exactly one page of presentation commonly used in PowerPoint. It is usually shown via a series of image slides on a projected screen.

This is the best tool Yara needs to provide step-by-step instructions to her staff on how to use a new system for conducting performance reviews.

Slides would be very helpful as they would show the steps one at a time to the members of Yara's staff so they can learn better and faster.

An application programming interface (API) is: Group of answer choices the code the application software needs in order to interact with the CPU the currently active part of an application all other answers are incorrect the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM

Answers

Answer:

The code the application software needs in order to interact with the CPU

Explanation:

what is known as Ip address

Answers

Answer:

IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.

Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for writing programming code. They are usually strong problem-solvers. They spend most of their work hours running experiments in a laboratory. They must hold advanced degrees in computer science.

Answers

Answer:

First two statements: yes. Last two: not so much.

But many of the better ones do have advanced degrees, but some don't.

The laboratory statement is silly; they sit behind a set of screens figuring out stuff and writing code.

It should be noted that statements are true about software engineers are;

They are responsible for writing programming code. They are usually strong problem-solvers.

Software engineering can be regarded as branch of computer science which is responsible for the development as  well as the building of computer softwares, these could be applications software or system software.

The engineers that carry out this process is referred to as software engineers and they are responsible for responsible for writing programming code.

We can conclude that software engineers are strong problem-solvers.

Learn more about software engineer at:https://brainly.com/question/25757629

The application layer process that sends mail uses __________. When a client sends email, the client process connects with a server process on well-known port __________. A client retrieves email, however, using one of two application layer protocols: ________ or ________. With ________, mail is downloaded from the server to the client and then deleted on the server. The server starts the __________ service by passively listening on TCP port __________ for client connection requests. However, when a client connects to ta server running __________, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

Answers

Answer:

1. SMTP.

2. 25.

3. POP.

4. IMAP.

5. POP.

6. POP.

7. 110.

8. IMAP-capable server.

Explanation:

The application layer process that sends mail uses Simple Mail Transfer Protocol (SMTP). When a client sends email, the client process connects with a server process on well-known port 25. A client retrieves email, however, using one of two application layer protocols: Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). With POP, mail is downloaded from the server to the client and then deleted on the server. The server starts the POP service by passively listening on TCP port 110 for client connection requests. However, when a client connects to a server running IMAP, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

for what remot control help​

Answers

Answer:

?

Explanation:

Answer:

to control other things

Explanation:

hope this helps

Why are digital computer known as general purpose computer

Answers

More intelligent and better than others

Can someone please tell me how I can hack WiFi with a raspberry pi in Kali Linux do I need a wireless adapter for raspberry pi if so please tell me and me ASAP please thanks appreciate it

Answers

lol wym hack wifi? need more info lol

Well honestly i dont know how to. i personally don't own one but there is YT videos. Go on YT and look up network chuck. hehas what your looking for.

Xavier wants to use a solver to find optimal solutions for a decision problem. What should he select as X in the series of clicks for this purpose: Data tab > X > Solver > Enter Solver parameters (read on) > Check "Make Unconstrained Variables Non-Negative" > Select "Simplex LP" > Solve?

Answers

Answer:

The answer is "Analyze"

Explanation:

The term Analyze is the use of a machine or critical thinking to enable more effective management by companies and their information systems, in which the Xavier wishes to use a method for solving to find ideal decision-making strategies. Its object of the series analyses X selects, that's why the "Analyze " is correct.

One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes. What should you do to resolve to this problem?
A. Assume the battery is failing and replace it.
B. is failing and replace it.Configure the Power Scheme settings to minimize battery usage.
C. Put the battery in another notebook to verify that it’s the battery that is failing.
D. Calibrate the battery to synchronize the power meter to the actual charge capacity of the battery.

Answers

Answer:assume the battery is failing and replace it

Explanation:

Other Questions
Please help!!The spread of 24-hour news networks during the 1980s and 1990s made the American public more aware of which of these? a. global warming b. tobacco dangers c. humanitarian crises d. government intrusion Estela compra la comida en la _________. tienda juguetera biblioteca comisara Derek can paddle his kayak 6 miles per hour in still water. It takes him as long to paddle 10.5 miles upstream as it takes him to travel 31.5 miles downstream. Determine the speed of the river's current. Why is the sequence of amino acids important to the properties of a protein? It provides structural support; the structure determines the function. It retains and transmits important biological information. It stores energy and provides covering to avoid water loss. It stores energy and provides structural support for cells. i will rate you brainliest Find an equation of the line through the given points right the final answer in intercept form Why do many Georgia rivers begin in the Blue Ridge province? The minute hand of a watch has a length of 1.4 cm. Find the; (a) distance moved by the tip of the minute hand from 8.13 am to 8.49 am. (b) angle swept by the minute hand if the tip moves 8.8 mm (c)time it will bee when the minute hand sweeps the angle calculated in (b), if the minute hand started moving at 8.39 am Read these scenarios, and then answer the questions that follow.Harry teaches math in a school. He owns a car and a house. He loves to paint whenever he has time. During the recent presidential election, he voted for the candidate whose economic policies he strongly believed in, such as providing incentives for people to start their own businesses. Someday, Harry wants to open his own art gallery.Julie works at a government-owned factory. Most people in her town work in the same factory. Julie is a born artist and aspires to own an art gallery. However, the government restricts the number of businesses that can be started each year.What is different about these two situations? Nights and Dragons From the memoir of author Abigail Prynne 1 I sit at my desk listening to thunder growl outside my window. Flashes of light burst through the darkness, and wind races past my window. The thrilling combination of sight and sound conjures up visions of dragons roaring proudly, breathing fire, and soaring across the midnight sky. Dragons first fascinated me when I was a little girl. They have followed me ever since. The magnificent creatures appeared in storybooks I read in the library, paintings I saw in museums, movies I watched in the theater, and the dreams I had in my sleep. By the time I was thirteen, one question consumed me. I wanted to know if dragons ever existed, so I set out on a quest for facts. 2 As I started my research, I discovered many skeptics. Scientists presented evidence to show why dragons could notand did notexist. They explained that it would be impossible for dragons to fly because they would be too big. They laughed at the idea of dragons breathing fire. They pointed out that no other animal has ever done this. They said that if dragons had lived, someone would have found remains somewhere in the world. No bones about it, there were plenty of logical explanations. It would have been easy for me to accept that the only place dragons ever existed was in the imaginations of those who believed. 3 I could have given up, but I thought about my grandmother. She always told me that "people who believe that science is the answer to everything are missing out on everything else." With her words in mind, I searched some more. There were many facts that hinted that dragons may not be fictional. I noticed that cultures across the world all described dragons in similar ways. This was odd because they had no way to communicate with each other. I found dragons mentioned in more than just stories. They appeared in old legal papers, in the travel logs of Marco Polo, and in the Bible. I saw that the Chinese calendar uses a different animal each year. Dragons are included along with eleven real animals. I began to believe it was a real possibility that all of these people were talking about a creature that actually existed. 4 With renewed hope that there was some truth to the legends, I looked for new research. I found that some experts disagreed with popular arguments against dragons. They suggested that a dragon could have four stomachs like a cow. If it created stomach gases like birds, it might create enough to lift itself off the ground. This would give it the ability to fly. If it forced out air when diving toward the earth, it might release gases which could ignite into flame. When the animal died, the stomachs would release strong acids that would dissolve its dead body over time. Biologists backed up these ideas with sketches and models based on known animals. Not everyone agreed with these ideas, but many of the things we accept about dinosaurs and other extinct species started the same way. 5 I doubt we will ever truly know whether dragons existed. There may always be two sides to the fiery debate. Some will say the stories come from active imaginations. Some will believe with all their hearts that the legendary creatures roamed our ancient world. I don't know for certain which side to believe, but the sound and fury of a night like this makes me smile. It rekindles my childhood dreams and keeps the exciting possibility alive. Which sentence from paragraph 4 makes an explicit statement without offering any implicit suggestions? With renewed hope that there was some truth to the legends, I looked for new research. If it created stomach gases like birds, it might create enough to lift itself off the ground. Biologists backed up these ideas with sketches and models based on known animals. What is a Legal tender plsss Hess's law states that:A. Energy cannot be created nor destroyed, it can only change form.B. The enthalpy change when 1 mole of a substance undergoes complete combustion under standard conditions is equal to molar masses of the compounds.C. When the enthalpy changes under standard conditions, 1 mole of a substance is formed from its elements.D. The overall enthalpy change for a reaction is independent of the route the reaction takes. 3. She isnt here. She ..................... in the living room. a. sits b. is sitting c. sat d. was sitting Bonjour, Bonjour. Comment T'appelles tu. je mappelle israel, Cava? Cava Bien. quel age as tu. j'ai 12 ans. Salut! is this french conversation right? Actual time in seconds recorded when statistics students participated in an experiment t test their ability to determine when one minute 60 seconds has passed are shown below.Find the mean median mode of the listed numbers. 53 52 72 61 68 58 47 47 they have just built this bridge .( change into negative) What is f(0) given f(x) = 5(x + 2)2 10? 2/5(10c -35) (the 35 is negative) Tan - cosec sec (1-2 cos) = cot ASAP HELP WILL MARK BRAINLIEST