A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Answers

Answer 1

Answer:

An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.


Related Questions

help me i'll brainiest if its right

Answers

Answer:

Your response is correct.

I hope this helped at all.

Answer:A

Explanation: by limiting the amount of thermal energy that flows  out of the drink keeps it nice and taste :D

Coordination in a global information system requires a _____ architecture for data, standardization within departments.

Answers

Coordination in a global information system requires a decentralized architecture for data, standardization within departments

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

Answers

Computer data storage

An electronic element that stores data by changing its resistance based on the current that has passed through it, similar to RRAM (Resistive Random Access Memory), is called a Memristor.

What is memristor

The term "memristor" is a combination of "memory" and "resistor," indicating its ability to retain information based on its resistance state.

Memristors are considered a fourth fundamental passive circuit element, alongside resistors, capacitors, and inductors.

Learn more about electronic element at

https://brainly.com/question/24977425

#SPJ2

7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​

Answers

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18

What is an FPS? Describe the acronym as it applies to video games and explain two games popular in the 2000s that flourished in this game category.

Answers

1. Short for frames per second, fps is a measure of how many full screen, still images are captured or displayed in one second of video recording/playback or video game play.

The use of computer systems to distribute potentially harmful information is called:
A) Propaganda
B) Cyber security
C) Computer fraud
D) Industrial espionage

Answers

Answer:

cyber security I think that is what it is

Explanation:

m

A cyber security is the distribution of malware and other server attack that are aimed at destroying the integrity of the system and is also called as the information compromise.

There are various tools and techniques that can be used to protect and save from such harmful attacks. Other attacks include cyber fraud and are done to distribute the harmful information.

Hence the option B is correct,

Learn more about the computer systems to distribute potentially.

brainly.com/question/25705570.

If you want to excel in the field of web design, what must you be able to make and keep?
price estimates
statement of work
final deadlines
promises

Answers

Answer:

You  need to beable to make final deadlines because maybe if your adding divs or maybe something takes a bit long for you to do you need to give the person your working for an idea of what and why you may take long to get your website polished.

Explanation:

Answer:

B. final deadlines

Explanation:

edg 2021 (got 100%)

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.

Answers

Answer:

Social engineering is a process of manipulating people into breaking normal security procedures or divulging confidential information.

Explanation:

how do you play pokemon go

Answers

Download the app and make an account hope this helps!

Answer:

download the app then tap your screen for the rest of your life

(And I'm being serious)

In Linux, most applications and commands are in the ____ directory or its subdirectories bin and sbin.

Answers

On a Linux computer, most of the software applications are saved in the /usr directory or in its subdirectories named, bin and sbin.

A Linux can be defined as an open-source and community-developed operating system (OS) that is designed and developed for the following electronic devices:

Mainframes. Computers.Embedded systems.Mobile devices.

Generally, the Linux operating system (OS) is based on UNIX and it is typically released under the GNU general public license (GPL).

On a Linux computer, the commonly used directory for saving most software applications is the /usr directory or sometimes its subdirectories named, bin and sbin.

Read more: https://brainly.com/question/20629962

who is the father of computer?
a.jeff bezos
b.cgarles babagge
c.micky pointe
d.marlos carten​

Answers

Answer:

Explanation:

B.

The frame rate is the result of multiplying the length of the film times its width

True or False

Answers

Answer:

False

Explanation:

frame rate is how many frames are shown per second in a video

the length of the film times the width is the resolution. not frame rate

A(n) ___________ allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards.

Answers

Answer:

A(n) videoconference allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards.

what is not an example of a changing operating space?

Answers

What is not an example of a changing operating space? A parking garage. Riley is driving down the highway when the road starts curving to the right.

Parking in garage is not an example of a changing operating space.

What is operating space?

When an operating space is said to be "changing," it usually means that the environment around your car is deteriorating or switching from an open to a closed state.

Operational Spaces are the space(s) inside the Facilities from which the Concessionaire shall have the right, privilege, and obligation to continuously and for the duration of the Term operate its concession in accordance with the terms and conditions of this Agreement.

Distractions while driving, such as texting and using a phone, driving dangerously, such as going too fast or following too closely.

Driving when intoxicated. While drinking and driving is not especially high among novices, it produces a disproportionate number of fatal crashes.

Thus, parking garage is the answer.

For more details regarding operating space, visit:

https://brainly.com/question/9339555

#SPJ6

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

To delete a database object, press and hold or right-click the object in the Navigation Pane and then tap or click ____ on the shortcut menu.

Answers

Answer:To delete a database object, press and hold or right-click the object in the Navigation Pane and then tap or click Delete on the shortcut menu.

Explanation:

Hope I could help. Have a nice time there.

using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack

List down 5 elements of Multimedia

Answers

Answer:

text, image, audio, video, animation

Answer : The five elements of Multimedia are text, images, audio, video and animation.

Hope This Helps You.

SOMEONE WHO ACTUALLY KNOW HOW TO DO THIS PLEASE DO IT AND SEND A SCREENSHOT I REALLY NEED IT FOR MY EXAMS AND DONT TROLL ​

Answers

What computer do you own?

what are the different forms of auto form?​

Answers

Answer:

There are two types of AutoForm—the New Object: AutoForm and the builder-based AutoForm. The New Object: AutoForm generates a very simple and uninspiring data entry form. The builder-based AutoForm creates five different types of forms: Columnar, Tabular, Datasheet, PivotTable, and PivotChart.

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

A ______________ utility provides an overview of your files and lets you rename, delete, move, and copy files and folders.

Answers

Answer:

File Management Utility

Explanation:

File Management Utility is a computer software that help to browse, search, arrange, find information, and quickly preview the files of the system.

The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.

Answers

Answer:

url

Explanation:

Time shifting occurs when _______. A. Clocks move ahead one hour in the spring b. Works are copied and kept for future generations c. Individuals copy works to view at a later time d. Copyrighted materials comes into the public domain.

Answers

Answer:

c. Individuals copy works to view at a later time

Explanation:

Time Shifting: Recording a program to a storage medium to be consumed at a later date.

Time shifting occurs when Individuals copy works to view at a later time. The correct option is c.

What is time shifting?

As the name implies, time shifting is the shifting of a signal in time. This is accomplished by adding or subtracting a shift quantity from the time variable in the function.

Time shifting or Shifting a signal in time means that the signal is either delayed or advanced in the time axis.

Other space shifting processes include time shifting, which involves recording a radio broadcast and listening to it later, and format shifting, which involves converting a media file into a different format.

You can watch a show at separate moments of the day by changing the time. When people copy works to view later, they are time shifting.

Thus, the correct option is c.

For more details regarding time shifting, visit:

https://brainly.com/question/11563105

#SPJ5

The USGS and National Weather Service have many sensors collecting data about natural events.

That data can be used to create a weather map.

Identify the parts of the Input-Process-Output model for each step.


(output, input, process): weather map displayed on a web page


(output, input, process): determination of color to be used on the map


(output, input, process): sensors collect temperature and precipitation data

Answers

Answer:

Explanation:

Throughout many regions on the chart, a standard plotting code demonstrates air currents speed and direction, average temperature and relative humidity, barometric pressure and its change over the previous hours, the number and variety of clouds, the weather type, including visibility restrictions, and the amount and type of precipitation.

USGS and National Weather Service

As per the question, the USGS  and National weather services are mapping out the region to collect the data for the natural events. The data is collected in the form of maps and is used for the identification of the input and the output model steps.

The answer is precipitation data, visibility data.

The NWS is a federal agency of the united stated that is tasked to prove the forecasts and for the formation of hazardous weather events and warns the public of the related events.

Learn more about the National Weather Service

brainly.com/question/17774978.

Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Sandbox. ... Real-time strategy (RTS) ... Shooter (FPS and TPS) ... Multiplayer online battle arena (MOBA) ... Role-playing games (RPG, ARPG, and more) ... Simulation and sports.

- BRAINLIEST answerer

Lol yeah I agree w the person above, I don’t wanna copy

Raina remembered when she taught Amara to draw. What happened?

Answers

Sisters is an autobiographical graphic novel written by Raina Telgemeier as a follow-up to her earlier graphic memoir Smile. It details a long summer road trip taken from San Francisco to Colorado by her family and explores the relationship between Raina and her younger sister, Amara.

- BRAINLIEST answerer

What is a megavirus in computing

Answers

In the lab experiments conducted by Professor Claverie and colleagues, in which they infected fresh-water amoebas, Megavirus was seen to construct large trojan organelles - the "cells within cells" that would produce new viruses to infect other amoebas.

quadratic equation 4

Answers

In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.

HOPE IT HELPS:)

Other Questions
A constitutionalamendment ispassed bytwo-thirds ofthe House andSenate.The amendmentis approved bythree-fourthsof the states.The amendmentis added tothe U.S.Constitution.What was the process illustrated in the diagram designed to do?A. Prevent small political groups from blocking changes to theConstitutionB. Make the process of changing the Constitution as easy aspossibleC. Ensure that state governments submit to federal authority underthe ConstitutionD. Allow the Constitution to be updated to suit changing times explains why domestic travel is better than international travel in our Country 82. How many moles of calcium are in 3.82g of calcium? Tianna's Urbanwear advertises the following sale: Shirts are 1/2 off the original price; pants are 1/3 off theoriginal price; and shoes are 1/4 off the original price.A pair of pants usually sells for $33.00. What is the sale price of a pair of pants?Show Your WorkYou have responded to 5 of 8 questions. 1 response is missing a drawingSubmit What element is found in liver and is needed to prevent anemia? 1. What is the difference between a society and a culture?2. How are our identities connected to the culture that we live in?3. In what ways is social life like performing in a play? What is the first step needed to solve (2/5)x - 6 = -16 La abuela de Phil y Ana usa lentes y es canosa. Quin es? (1 point) a Es Tina. b Es Molly. c Es Claire. d Es Helen. Groups like the Ku Klux Klan resisted Reconstruction by:O A. voting for Robert Smalls.O B. joining the Freedmen's Bureau.O c. making life unsafe for African Americans.D. supporting the Fourteenth Amendment. Your cell phone bill in August was $61.43, which was $21.75 more than your bill in July. Your cell phone bill in July was $13.62 less thanin June. What was your cell phone bill in June? I am confused here. Help me, tomorrow is my exam. Is tailoring a secondary activity or tertiary? Bcoz a tailor also makes suits etc and also fixes them. For example if my coat has a cut, the tailor will repair it. A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records. A child with sickle cell anemia experiences vaso-occlusive episodes. Which is the primary nursing objective while caring for the child _____ involves blaming one's failures on internal, personal factors and attributing one's successes to external, situational factors. which answer is correct how to know when romaine lettuce is ready to harvest who is the prime minister of Bangladeh? did the plymouth colonists really call themselves pilgrims Sanjay is part of a group text with several of his friends. One of them had an unpleasant encounter with a student in their class who is not partof the group text. Sanjay's friends begin putting down this student in ways that are cruel and would be hurtful if the student ever saw them, sohe is not comfortable responding. Why is this indirect pressure?OA. He is uncomfortable with the situationOB. He has been asked his opinion directly.OC. His friends will turn on him if he does not respond.ODHe feels that his friends expect him to act a certain way. Step functionsI dont get whats its trying to tell me to do not do I know where to begin