Select the correct answer.
A computer using a connectionless network protocol sends too many data packets to another computer, causing loss of a few packets. As a result, the message appears jumbled to the user at the destination computer. How does TCP overcome this issue?
A.
by using flow control
B.
by using cables
C.
by using terminals
D.
by using a larger IP address
Please only answer if you are 100% sure

Answers

Answer 1

Answer:

D by using a larger IP address correct

Explanation:

Correct answer I hope this helps you :)


Related Questions

Exercise 3.7.1: Proving statements about odd and even integers with direct proofs. info About Each statement below involves odd and even integers. An odd integer is an integer that can be expressed as 2k 1, where k is an integer. An even integer is an integer that can be expressed as 2k, where k is an integer.

Answers

The question is incomplete. The complete question is :

Each statement below involves odd and even integers. An odd integer is an integer that can be expressed as 2k+1, where k is an integer. An even integer is an integer that can be expressed as 2k, where k is an integer. Prove each of the following statements using a direct proof. (a) The sum of an odd and an even integer is odd. (b) The product of two odd integers is an odd integer.

Solution :

Odd number integers = 2k + 1, where k is integer

Even number integer = 2k

a). Odd integer + even integer

  = 2k + 1 + 2k

 = 4k + 1

  = 2(2k) + 1

Let 2k = t, where t is integer

   = 2t + 1

  = Odd integer by definition

If number is 2t + 1 where t belongs to integer, then it is odd integer.

Hence proved.

b). Product of two odd integers :  [tex]$2k_1 + 1,\ \ 2k_2 +1 $[/tex]   where [tex]$k_1, k_2 $[/tex] belongs to integer.

[tex]$(2k_1+1)(2k_2+1)= 4k_1k_2+2k_1+2k_2+1$[/tex]

[tex]$2(2k_1k_2)+2(k_1+k_2)+1$[/tex]

Let [tex]$2k_1k_2 = a$[/tex] and [tex]$k_1+k_2 = b $[/tex]

here, a and b belongs to integers since [tex]$k_1$[/tex] and [tex]$k_2$[/tex] are integers.

We get:

2a+2b+1

= 2(a+b)+1

= 2l + 1,             Let (a+b)=l and l belongs to integers.

It is odd integer by definition.

Hence proved.

 

True or False? A three shot is a series of any three individual
camera shots.

Answers



True. A three shot is a series of any three individual camera shot ..

Please hellppp,is a yr 9 question

Answers

Answer:

See picture below.

You are the systems administrator for a large trust company. Most of the Linux servers in the company host databases that are accessed frequently by company employees. One particular Linux server has been reported as being very slow today. Upon further investigation using the top utility, you have found a rogue process that is wasting a great deal of system resources. Unfortunately, the rogue process is a database maintenance program and should be killed with caution. Which kill signal would you send this process and why? If the rogue process traps this signal, which other kill signals would you try? Which command could you use as a last resort to kill the rogue process?​

Answers

Answer:

soo long this one is ufff

Elza hos a document with plain text. She wants to format only the second paragraph of the fifth page to have two
columns. What sequence of buttons will Eliza click to set up the correct type of section break for this?
O Page Layout, Breaks, Page
O Page Layout, Breaks, Continuous
Insert, Page Break
O Insert, Continuous

Answers

Page layout breaks page

What is a feature of Accenture’s myNav platform?

A. supports a more responsive, cost-efficient, and secure workplace platform for project deployment and full upgrades.
B. powers a highly automated, data-driven, and low-risk approach to adopting and maintaining MS Office suites
C.helps assess, architect, and simulate Cloud solutions to determine the right Cloud architecture based on our clients’ business needs
D. enhances ability to innovate, boost business results, and speed up a client’s journey to intelligent enterprises
D.

Answers

A. because I said so dummy

One feature of Accenture’s myNav platform is that it:

C. Helps assess, architect, and simulate Cloud solutions to determine the right Cloud architecture based on our clients’ business needs

According to the given question, we are asked to state one feature of Accenture’s myNav platform and how it affects the cloud computing for businesses.

As a result of this, we can see that this Accenture’s myNav platform is designed to help businesses navigate through their cloud solutions so that they can choose the package that would meet their client's business needs.

Therefore, the correct answer is option C

Read more here:

https://brainly.com/question/25675206

True or False
humans shed skin in their sleep (pwease fweinds onwy answer)

Answers

Answer:

Not all people but sometimes it happens

____________ are the in – built functions that perform a particular pre – defined task when used in a computer program.

Answers

Answer:

System software.

Explanation:

System software are the in-built functions that perform a particular pre-defined task when used in a computer program. An example of a system software is an operating system.

An operating system (OS) is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes. Some examples of an operating system are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

V. Write a program in python for the following:
[10]
a) Jennifer wants to carpet her new room with pink carpet. Create a program that will ask the user for the two
dimensions of a room (length and width) and then calculate the area of the room, (length x width), before
finally displaying the answer​

Answers

Answer:

length = input("length of room:  ")

width = input("Width of room:  ")

Area = float(length) * float(width)

print("Area of room is: ", Area)

It's common to print a rotating, increasing list of single-digit numbers at the start of a program's output as a visual guide to number the columns of the output to follow. With this in mind, write nested for loops to produce the following output, with each line 60 characters wide: | | | | | | 123456789012345678901234567890123456789012345678901234567890

Answers

Answer:

The program in python is as follows:

for i in range(0,6):

   for i in range(0,9):

       print(" ",end='')

   print("|",end='')

print()

for i in range(1,61):

   print(i%10,end='')

Explanation:

See attachment for program output format

The next two instructions create a nested for loop

for i in range(0,6):

   for i in range(0,9):

This prints 9 spaces

       print(" ",end='')

This prints a vertical line at the top of the end of the spaces printed

   print("|",end='')

This prints a new line

print()

This iterates from 1 to 60

for i in range(1,61):

This prints 1, 2, 3....9, then 0, 6 times on a straight line

   print(i%10,end='')

In a block of addresses we know the IP address of one host is Roll no. Roll no. Roll no. Roll no./20.What is the first address and the last address of this block? Find the number of addresses in the block?
Hint: if your roll no is 33 then your ip address will look like this: 33.33.33.33/20

Answers

Answer:

If there’s one topic that trips people up (both new and experienced) in the networking industry, it is that of Subnetting.

One of the reasons this happens is that one has to perform (mental) calculations in decimal and also binary. Another reason is that many people have not had enough practice with subnetting.

In this article, we will discuss what Subnetting is, why it came about, its usefulness, and how to do subnetting the proper way. To make this article as practical as possible, we will go through many examples.

Note: While subnetting applies to both IPv4 and IPv6, this article will only focus on IPv4. The same concepts explained here can be applied to IPv6. Moreover, subnetting in IPv6 is more of a want rather than a necessity because of the large address space.

IP address network

For example, any traffic with a destination IP address of 192.168.1.101 will be delivered to PC1, while traffic addressed to 192.168.1.250 will be delivered to SERVER.

Note: This is an oversimplification of things just for understanding sake and refers to Unicast (one-to-one) IPv4 addresses. Traffic sent to Multicast (one-to-many) and Broadcast (one-to-all) IP addresses can be delivered to multiple devices. Also, features like Network Address Translation (NAT) allow one IP address to be shared by multiple devices.

To help your understanding of IP addresses and subnetting, you need to resolve the following fact in your head: Computers think in binary, that is, 0s and 1s. Therefore, even though we see an IP address represented like 192.168.1.250, it is actually just a string of bits – 32 bits in total for IPv4 addresses.

To make them more readable for humans, IPv4 addresses are represented in dotted decimal notation where the 32 bits are divided into 4 blocks of 8 bits (also known as an octet), and each block is converted to a decimal number.

For example, 01110100 in binary is 116 in decimal:

A unicast IPv4 address such as 192.168.1.250 can be divided into two parts: Network portion and Host ID. So what does this mean? Well, IPv4 addresses were originally designed based on classes: Class A to Class E. Multicast addresses are assigned from the Class D range while Class E is reserved for experimental use, leaving us with Class A to C:

Class A: Uses the first 8 bits for the Network portion leaving 24 bits for host IDs. The leftmost bit is set to “0”.

Class B: Uses the first 16 bits for the Network portion leaving 16 bits for host IDs. The two leftmost bits are set to “10”.

Class C: Uses the first 24 bits for the Network portion leaving 8 bits for host IDs. The three leftmost bits are set to “110”.

Note: The range of Class A is actually 1-126 because 0.x.x.x and 127.x.x.x are reserved.

With these classes, a computer/device can look at the first three bits of any IP address and determine what class it belongs to. For example, the 192.168.1.250 IP address clearly falls into the Class C range.

Looking at the Host ID portion of the classes, we can determine how many hosts (or number of individual IP addresses) a network in each class will support. For example, a Class C network will ideally support up to 256 host IDs i.e. from 00000000 (decimal 0) to 11111111 (decimal 255). However, two of these addresses cannot be assigned to hosts because the first (all 0s) represents the network address while the last (all 1s) represents the broadcast address. This leaves us with 254 host IDs. A simple formula to calculate the number of hosts supported

Explanation: Final answer is Start address: 192.168.58.0 + 1 = 192.168.58.1

End address: 192.168.58.16 – 2 = 192.168.58.14

Broadcast address: 192.168.58.16 – 1 = 192.168.58.15

You should adhere to the Windows standards when designing an interface because that consistency will ______________. a. give your interface a familiar look to the user b. make your interface easier to learn c. make your interface easier to use d. All of the above

Answers

Answer:

that's c I think

Explanation:

just guessed

OBJECTIVE QUESTIONS
1. In a computer keyboard the Alt, Ctrl, Shift, Del & Insert
keys are known as

Answers

Answer:

A modifier

Explanation:

because this modified a computer keyboard

The Stability and Growth Part has to do with _____.


bank reserves

the Economic and Monetary Union

U.S. trade

global money market

Answers

Answer:

The Stability and Growth Pact (SGP) is an agreement, among the 27 member states of the European Union, to facilitate and maintain the stability of the Economic and Monetary Union (EMU). ... The purpose of the pact was to ensure that fiscal discipline would be maintained and enforced in the EMU.

Explanation:

follow me for more

Pls awnser I will mark brainliest math

Answers

It’s 34....!!!! i did this before

Answer:

2788 or 116

Explanation:

PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO

Answers

Answer:

I need to have better photos in order to assist you...

Explanation:

I will attempt to get back with you if you can provide more clearer photos.

num1 = float(input("Enter your first number: "))

num2 = float(input("Enter your second number: "))

operation = input("What operation would you like to do? Type: add, subtract, multiply, or divide. ")

def add(n, n1):

   return n + n1

def subtract(n, n1):

   return n - n1

def multiply(n, n1):

   return n*n1

def divide(n, n1):

   return n/n1

if operation.lower() in ["add", "+"]:

   result = add(num1, num2)

   print(num1,"+",num2,"=",result)

elif operation.lower() in ["subtract", "-"]:

   result = subtract(num1, num2)

   print(num1,"-",num2,"=",result)

elif operation.lower() in ["multiply", "*"]:

   result = multiply(num1, num2)

   print(num1, "*", num2, "=", result)

elif operation.lower() in ["divide", "/"]:

   result = divide(num1, num2)

   print(num1, "/", num2, "=", result)

else:

   print("Not a valid operation.")

I wrote my code in python 3.8. I hope this helps.

pdf
B. Ayusin ang mga titik sa bawat bilang upang mabuo ang mga
tamang salita na bumubuo ng web browser at mga ilang
bahagi ng web browser. Isulat ang iyong sagot sa sagutang
papel.
1. terterin ploexrer
2. glegoo mechro
3. foxfire zillamo
4. bat mena
5. bat wen​

Answers

Answer:

Question wants the misspelled words to be properly arranged to give the correct names in relation to web browsers.

terterin ploexrer ⇒ Int-ernet Ex-plorerglegoo mechro ⇒ Goo-gle Ch-romefoxfire zillamo ⇒  M-o-z-i-l-l-a Fire-foxbat mena ⇒ Tab name.bat wen​ ⇒ New Tab

The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send an packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure. a = IP() a.dst = ’1.2.3.4’ a.ttl = 3 b = ICMP() send(a/b) If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result.

Answers

Answer:

answer b

is correct

The following code will not display the results expected by the programmer. Can you find the error? Declare Real lowest, highest, average Display "Enter the lowest score." Input lowest Display "Enter the highest score." Input highest Set average = low + high / 2 Display "The average is ", average, "."

Answers

Based on the information given, the first error in the code is that the Variable name is lowest, NOT low, and Set average = low + high / 2.

How to find the error in the code.

For Error 2: Variable name is highest, NOT high and Set average = low + high / 2

For Error 3 : Set average = low + high / 2. Thus, you will need to add the lowest and highest, then perform the division by 2

Set average = (lowest + highest) / 2 is the the correct statement.

Learn more about codes on:

https://brainly.com/question/25875879

Data entered in a cell will appear in the bar, found about the worksheet
a.status Bar
b.Equation Bar
c.Formula Bar
d.Data Entry Bar

Answers

Answer:

formula bar

Explanation:

The formula bar in Excel is located next to the name box

and above the worksheet area. It displays the data stored in

the active cell. The formula bar is used to view, enter, and

edit values and formulas in cells.

During critical thinking, the evaluation of information should use
some emotions
O True
O False

Answers

False any critical thinking shouldn’t involve emotions
Im pretty sure it’s false

Logistic Regression is a type of __________ problem.

Answers

Answer:

Logistic Regression is used to solve the classification problems, so it’s called as Classification Algorithm that models the probability of output class. It is a classification problem where your target element is categorical

Explanation:

The answer is "classification" because the named the Classification Algorithm.

It was used to solve classification difficulties. You are faced with a categorization situation wherein your goal component is a category.In the presence of more than one dependent variable, it's being used to calculate odds ratios. The binomial dependent variables render this approach similar to multiple linear regression. In the end, each variable's impact on a particular event's odds ratio is calculated.

Learn more:

Logistic Regression: brainly.com/question/20363984

type in computer code for Sonic the Hedgehog, does it look weird yes or no

Answers

Answer:

yes.

Explanation:

Click this link to view O*NET’s Tasks section for Psychiatrists. Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what are some common tasks performed by Psychiatrists? Select four options.

Answers

Answer:its 2.3.5.6

Explanation: i just did it on edge

Answer:

B,C,E,F

Explanation:

Cuz i said so

A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of data?

Answers

Answer:

Line graphs allow us to see overall trends such as an increase or decrease in data over time. Bar graphs are used to compare facts.

of what is famous Ted Nelson?​

Answers

Answer:

Nelson proposed a system where copying and linking any text excerpt, image or form was possible.

Explanation:

Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.

How I know:

I goggle it.

What are the paparazzi?
O A. Professional artists hired by stars for portraits
B. Tabloids that expose celebrities acting rudely
O C. Fans who watch videos of stars doing silly things
O D. Photographers who follow stars to take pictures

Answers

Answer:

d.photographers who follow stars to take pictures

You want to read input from the user to know how many apples they would like
to buy. Which statement should you use to read in a number from the user?
var applesToBuy = readLine("How many apples would you lik
e? ");
o
var applesToBuy - println("How many apples would you like?
Dj
var applesToBuy - readInt("How many apples would you like?
1);
var applesToBuy
= nextInt("How many apples would you like?
")

Answers

Answer:

var applesToBuy = readLine("How many apples would you lik

e? ");

Explanation:

It asks the user to enter answer the question and it stores the answer into the applesToBuy variable.

Its right dont worry.

In the given scenario, if we use "InputStream" class object that inputs value from the user-end, in which we use "readInt" keyword. In Java, this function of the DataInputStream class reads 4 input bytes and returns an integer value. This method takes the next 4 bits from the input stream, transforms them to integers, and would then returns.

And the wrong choice can be defined as follows:

For choice 1, it use the "readLine" method which inputs the string value.For choice 2, it use the "println" method which prints value.For choice 4, the "nextInt" method is the part of "Scanner" class.

Therefore, the answer is "Option 3", which is  "var applesToBuy - readInt("How many apples would you like?");".

Learn more:

brainly.com/question/20637377

What is the primary reason for compressing video files?

increase frames per second

increase bit rate

decrease file size

decrease playback delay

Answers

Answer:

Decrease file size

Explanation:

This goes for almost every file you compress. If you compress it, you try to decrease the storage space it takes up as a way to make it more portable. After a compressed file is extracted, it does not have many effects on the state of the extracted file.

Answer:C

Explanation:Decrease file size

Issues in plagiarism and copyright when blogging can be prevented. True or false​

Answers

Answer:

It’s false

Explanation:

I can’t explain it’s too confusing

Other Questions
please, please help, if you could show work too that would be so appreciated Read this paragraph the land part 4. I glanced over at the other rider. The fellow was older than I, and had the weight of a man on him. He glanced over at me and he grinned, but it wasn't a friendly grin; I knew he was mocking me. Pay him no mind. said Mitchell. He's all teeth, nothin' else. what type of conflict does Paul describe in this excerpt? 1. Character v. Character 2. Character v. Self 3. Character v. Society 4. Character v . NaturePlease hurry, 95 points, thank you ! If you started counting from 1st grade, how many years of education would the typical professional astronomer have today, at minimum?12141618 17 of 40 students brought Valentine Smencils. What percentage brought Smencils? convert 2.5t into pounds Help me please:( I need it The price of a pair of earrings is $22 but Priya buys them on sale for $13.20.By how much was the price discounted? bonjour pouvais vous m'aider a expliquer cette. citation je suis en terminale "Il ne s'agit pas d'interdire la technologie. Il s'agit de raliser que sans la capacit de se concentrer, nous sommes des proies faciles pour le dtournement de notre autonomie". One day there were 24 students in class. The next day there were 19. Whatwas the percent change in the number of students in class from the firstday to the second day? Which of the following is the source of Europe's most important river systems?the Alps. the Pyrenees Mountains. the massifs of the Iberian Peninsula. the Tagus and Tiber Rivers. By completing the requirements of one of the three professional organizations of accountants in Canada, you can become one of three types of accountants. These are: High levels of what substance found in the blood determines diabetes and prediabetes? Two coins are tossed and a number cube (dice) is rolled. How many outcomes arepossible?A. 24B. 18C. 12D. 10 Nico gives himself $90 a month to spend on fast food. He spends$30 a week. The graph represents the amount of money Nicohas left after each week. Many inland wetlands have been drained or filed to grow crops or have been covered with concrete, asphalt and buildings true or false ANSWER QUICK PLS ANSWER QUICK PLS Based on the scatter plot which is the best prediction of the number of gallons of water used by this business when the cost of water is $180 which location was the eastern boundary of the louisiana purchase Which numbers go in the red and blue box to make the same sum(ADDING INTEGERS)!! Refer to the Newsela article Dying of Hunger: What Is a Famine?What is the authors viewpoint in the article? The author is concerned with an accurate and factual description of famine so it will not be politicized. The author rejects the definition of famine because there are factors that prevent a true understanding of famine. The author is more focused on stopping suffering in war-torn countries than finding ways to relieve famine. The author believes the best way to address the issue of starving populations is to hold governments responsible for famine.