FILL IN THE BLANK. question 10 a 32-bit number that's used to keep track of where you are in a sequence of tcp segments is known as a(n)___number

Answers

Answer 1

A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a sequence number.

About sequence number

Sequence number Indicates the serial number of the first octet of data in a TCP segment to be sent. This field must always be set, even if there is no correct data (payload) in the segment.

When starting a TCP connection session, the segment with the SYN (Synchronization) flag is set to a value of 1, this field will contain the value Initial Sequence Number (ISN). This means that the first octet in the byte stream in a connection is ISN+1.

History of sequence number

When Vint Cerf and Bob Kahn first wrote the specification for this protocol in 1973, the internet was still a prohibited medium for commercial purposes.[1] In May 1974, the IEEE published a paper entitled "Protocol for packet interconnection of networks."[2] For the authors of the paper, Cerf and Kahn described an interconnection protocol for sharing services by utilizing packet-exchange between connected network nodes. The main control component of this model is called the "Transmission control program".

Incorporates both connection-oriented link and datagram services between hosts. This monolithic transmission control program is then broken down into a modular architecture consisting of the transmission control protocol at the connection-oriented layer and the internet protocol at the datagram layer. This model was later known as TCP / IP, although formally the term used is the Internet Protocol Package.

Learn more about sequence number at https://brainly.com/question/15050718.

#SPJ4


Related Questions

How have advancements in technology and social media impacted communication and relationships in our society?

Answers

Answer:The advancement of technology has changed how people communicate, giving us brand-new options such as text messaging, email,  and chat rooms,

Explanation:

Answer: the answer will be they allow faster and more efficient communication and can help build relationships.

Explanation:

Which topic would be included within the discipline of information systems

Answers

, , , , , are only a few of the subjects covered within the study area of information systems. Business functional areas like business productivity tools, application programming and implementation, e-commerce, digital media production, data mining, and decision support are just a few examples of how information management addresses practical and theoretical issues related to gathering and analyzing information.

Telecommunications technology is the subject of communication and networking. Information systems is a branch of computer science that integrates the fields of economics and computer science to investigate various business models and the accompanying algorithmic methods for developing IT systems.

Refer this link to know more- https://brainly.com/question/11768396

Inkjet vs laser printer specifications

Answers

The difference between Inkjet and laser printer specifications are the Little nozzles used by inkjet printers and the laser printer used resolution, and printing width.

What is Inkjet vs laser printer?

Little nozzles used by inkjet printers release ink droplets directly onto the paper. If you want to create high-resolution photos, graphics, or images for your documents, this method works well for images that are vividly colored.

Instead of using ink that contains dye or pigment, laser printers use toner powder.

Therefore, the small nozzles used by inkjet printers and the resolution and printing breadth utilized by laser printers are the differences between inkjet and laser printer parameters.

To learn more about Inkjet vs laser printer, refer to the link:

https://brainly.com/question/5039703

#SPJ9

The question is incomplete. The complete question are given below:

What's the difference between Inkjet vs laser printer in the terms of specifications?

create a powerpoint presentation on various e commerce websites. compare them and write which one is your favourite and why

Answers

The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.

Thus, By providing information via various website services, you can raise audience engagement and knowledge. Internet stores Ppt Images and Graphics.

You can deliver information in stages using this template. Using this PPT design, you may also show information on products, exclusive discounts, and strong online websites. This style is entirely changeable, so personalize it right away to satisfy the demands of your audience.

A lousy PowerPoint presentation can detract from the excellent content you're providing with team stakeholders because of poor color choices or unclear slides.

Thus, The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.

Learn more about PPT, refer to the link:

https://brainly.com/question/31676039

#SPJ1

Which IP QoS mechanism involves prioritizing traffic? Group of answer choices IntServ RSVP COPS DiffServ None of the above

Answers

Answer:

DiffServ

Explanation:

The IP QoS which is fully known as QUALITY OF SERVICE mechanism that involves prioritizing traffic is DIFFERENTIATED SERVICES (DiffServ).

DIFFERENTIATED SERVICES help to differentiate ,arrange ,manage, control and focus on network traffic that are of great significance or important first before network that are less important or by their order of importance in order to provide quality of service and to avoid network traffic congestion which may want to reduce the quality of service when their is to much load on the network .

ACTIVITY I DIRECTION: Complete the paragraph. Write in your ICF Notebook 1. When you're signed in to your OneDrive will appear as an option whenever you You still have the option of saving files to your computer. However, saving files to your OneDrive allows you them from any other computer, and it also allows you with​

Answers

When one is signed in to the OneDrive, it will appear as an option whenever one wants to save files. One can still have the option of saving files to the computer. However, saving files to the OneDrive allows one to access them from any other computer, and it also allows to easily share and collaborate on files with others. 

OneDrive simplifies file sharing and collaboration with others. You can easily share files and folders with specific individuals or groups, granting them either view-only or editing permissions. This makes it convenient for working on group projects, sharing documents with clients or colleagues, or collaborating with remote team members. Multiple people can work on the same file simultaneously, making it easier to coordinate and streamline workflows.

Learn more about OneDrive here.

https://brainly.com/question/17163678

#SPJ1

In Chapter 8, Programming Exercise 6 you created a Salesperson class with fields for an ID number and sales values. Now, create an application that allows you to store an array that acts as a database of any number of Salesperson objects up to 20. While the user decides to continue, offer four options: to (A)dd a record to the database, to (D)elete a record from the database, to (C)hange a record in the database, or to (Q)uit. Then proceed as follows: • If the user selects the add option, issue an error message, Sorry - array is full -- cannot add a record, if the database is full. Otherwise, prompt the user for an ID number. If the ID number already exists in the database, issue the error message Sorry -- ID number already exists. Otherwise, prompt the user for a sales value and add the new record to the database. • If the user selects the delete option, issue the error message, Cannot delete - no records in database, if the database is empty. Otherwise, prompt the user for an ID number. If the ID number does not exist, issue the error message, Sorry - ID number #xxx does not exist in the database. Otherwise, do not access the record for any future processing. • If the user selects the change option, issue the error message, Database is empty -- cannot change record, if the database is empty. Otherwise, prompt the user for an ID number. If the requested record does not exist, issue the error message, Sorry - ID number #xxx does not exist in the database. Otherwise, prompt the user for a new sales value and change the sales value for the record. After each option executes, display the updated database in ascending order by Salesperson ID number and prompt the user to select the next action. An example of the program is shown below: ... Do you want to (A)dd, (D)elete, or (C)hange a record or (Q)uit >> A Enter salesperson ID >> 7 Enter sales >> 550 Current database: ID #5 $500.0 ID #6 $600.0 ID #7 $550.0 Do you want to (A)dd, (D)elete, or (C)hange a record or (Q)uit >> C Enter ID to change >> 6 Enter

Answers

A good example of how a person can implement the described application in Python is given in the image attached

What is the Programming about?

Sales goals provide a well-defined path for your sales team to contribute towards the attainment of your company's overarching targets.

The Salesperson class is one that is set up in this code, and it is one that is made up of attributes such as an ID number and sales value. The Salesperson objects are saved in the database in the form of a list. The software subsequently offers alternatives to include, eliminate, modify data, or exit. The records in the database are organized by ID number in ascending order and are shown on the screen after each action.

Learn more about Programming from

https://brainly.com/question/26134656

#SPJ1

In Chapter 8, Programming Exercise 6 you created a Salesperson class with fields for an ID number and
In Chapter 8, Programming Exercise 6 you created a Salesperson class with fields for an ID number and

What is the purpose of the Error Alert feature?

Answers

Answer:

When you add data validation to a cell, the Error Alert feature is automatically turned on. It blocks the users from entering invalid data in the cell.

Explanation:

There ya go.. -_-

Answer:

A) To alert the user to data entry mistakes  

Explanation:

Which of these areas of technology best classifies television?

a. Information and Communication

b. Bio-related and Agricultural

c. Medical

d. Environmental

e. Production, which includes manufacturing and construction

f. Transportation

g. Energy and Power

h. Nanotechnology

Answers

Answer:

a. Information and Communication

h. nanotechnology

Explanation:

\(.\)

¿por que hay peligros en internet?

Answers

Answer:

Wait

it eases off.

Get home,

gathered,

very close and look up –

we find it’s all right.

Play:

they be.

For life,

but all vanished

picture faces –

matter: I do or don’t.

More,

something

out of hold

squeeze it tightly

my best,

my best life.

Opened,

something –

back at that moment –

all marchers

the room, the door, the front

rang through the outside

Explanation:

A contains elements that appear closest to the user, will have the best focus, and are meant to draw the most attention within design.

Answers

Answer:

Emphasis is the part of the design that catches the viewer's attention.

The inFS.open(str) function has a string parameter str that specifies the _____ of the file to open.

Answers

Answer:

str represents the name of the file to open

Explanation:

Required:

What does str represents in the above syntax

Before the inFS function can be used to access or read or write into a file, the file name has to be specified.

This could be done in any of the following ways:

1. inFS.open("abc.txt")

2. str = "abc.txt"; inFS.open(str);

In (1), the file name is specified directly into the function

While in (2), the filename is passed into a string variable which is then further passed to the inFS function.

In the case of this question, method 2 is used and the str represents the name of the file

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page

Answers

Answer:

The correct answer is "List of posts with the most recent ones at the top".

Explanation:

A website that includes someone else's thoughts, insights, views, etc. about a writer or community of authors and that also has photographs as well as searching the web.It indicates that perhaps the blog should distinguish between different articles about the site because then customers who frequent the site will observe and experience the articles on everyone's blogs.

So that the above would be the appropriate one.

Which of the following tactics can reduce the likihood of injury

Answers

The tactics that can reduce the likelihood of injury in persons whether at work, at home or wherever:

The Tactics to reduce injury risks

Wearing protective gear such as helmets, knee pads, and safety goggles.

Maintaining proper body mechanics and using correct lifting techniques.

Regularly participating in physical exercise and strength training to improve overall fitness and coordination.

Following traffic rules and wearing seatbelts while driving or using a bicycle.

Ensuring a safe and well-lit environment to minimize the risk of falls or accidents.

Using safety equipment and following guidelines in sports and recreational activities.

Being aware of potential hazards and taking necessary precautions in the workplace or at home.

Read more about injuries here:

https://brainly.com/question/19573072

#SPJ1

write one paragraph about hosted and nonhosted applications. be sure to differentiate the characteristics of each one.

Answers

Any piece of software that runs on the servers of another provider rather than your own is a hosted application. Unhosted web apps do not send your user data to their server, in contrast to non-hosted web apps, also referred to as "serverless," "client-side," or "static" web apps.

What is hosted and non-hosted application?

A situation in which you, the client, manage every aspect of hosting on your own server as compared to having a third participant handle it on theirs is referred to as a "non-hosted eCommerce solution." If you opt for the non-hosted (also referred to as "self-hosted") method, you might use an open source eCommerce platform like Magento, Slatwall, or osCommerce.

In contrast, you might opt to purchase an enterprise licence for a proprietary software programme like Micros, NetSuite Marketing, or even SAP. Whatever eCommerce platform you decide on, all internal hosting-related tasks will be handled by your staff.

To know more about hosted and non-hosted application, check the link below:

https://brainly.com/question/24852211

#SPJ4

You work at a print shop that produces marketing materials, and your manager asks you to install a new printer. The printer comes with two options for drivers. One uses PCL, and the other uses Postscript. Which driver is the best option and why

Answers

Since you work at a print shop that produces marketing materials, and your manager asks you to install a new printer. The drivers that is best is PCL, because it can be used in the office to print physical document while the Postcript can only be used for online document or pdf and since it is office job, PCL is the best.

What is PCL  printer?

PCL use depends on the device. This indicates that certain printed data, typically graphical data like fill areas, underlines, or fonts, is created by the drivers for this language by using the printer hardware. As a result, the print job can be processed by the computer fast and effectively. The production and processing of page data must then be finished by the printer.

Note that If you typically print from "Office" programs in general, use the PCL driver. If you wish to print PDFs more quickly or use professional DTP and graphics tools for the majority of your printing, pick the PostScript driver.

Learn more about printer driver from

https://brainly.com/question/14230829
#SPJ1

What is block chain?

Answers

Answer:

Block Chain is a system of recording information that makes it difficult or impossible to change, hack, or cheat the system.

A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.

Hope this helps.

x

Blockchain is a distributed database existing on multiple computers at the same time. It is constantly growing as new sets of recordings, or ‘blocks’, are added to it. Each block contains a timestamp and a link to the previous block, so they actually form a chain. The database is not managed by any particular body; instead, everyone in the network gets a copy of the whole database. Old blocks are preserved forever and new blocks are added to the ledger irreversibly, making it impossible to manipulate by faking documents, transactions, and other information. All blocks are encrypted in a special way, so everyone can have access to all the information but only a user who owns a special cryptographic key is able to add a new record to a particular chain.

CPU is also called RAM.
True or false.​

Answers

Answer:

False

Explanation:

RAM works in conjunction with the central processing unit (CPU). If RAM is the temporary memory, you can think of the CPU as the brain of the computer. The CPU chip retrieves data from the RAM

FALSE ...

BECAUSE RAM IS A MEMORY AND CPU IS A UNIT OF COMPUTER THAT'S WHY IT IS FALSE

PLEASE HELP
Find five secure websites. For each site, include the following:

the name of the site

a link to the site

a screenshot of the security icon for each specific site

a description of how you knew the site was secure

Use your own words and complete sentences when explaining how you knew the site was secure.

Answers

The name of the secure websites are given as follows:

wwwdotoxdotacdotuk [University of Oxford]wwwdotmitdotedu [Massachusetts Institute of Technology]wwwdotwordbankdotorg [World Bank]wwwdotifcdotorg [International Finance Corporation]wwwdotinvestopediadotorg [Investopedia]

Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.

What is Website Security?

The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.

It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.

Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.

Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.

Learn more about website security:
https://brainly.com/question/28269688
#SPJ1

PLEASE HELPFind five secure websites. For each site, include the following:the name of the sitea link

A personal business letter may be written by ?

Answers

Answer:

a college student inquiring about a loan.

Explanation:

Create a Python program to solve a simple pay calculation.

Answers

Answer:

def weeklyPaid(hours_worked, wage):  

   if hours_worked > 40:  

       return 40 * wage + (hours_worked - 40) * wage * 1.5

   else:  

       return hours_worked * wage  

 

 

hours_worked = 50

wage = 100

 

pay = weeklyPaid(hours_worked, wage)  

 

print(f"Total gross pay: Rs.{pay:.2f} ")

Explanation:

provides gross pay

which disipline involves creating computer networks

Answers

Answer:

computer science

The discipline of computer science includes the study of algorithms and data structures, computer and network design, modeling data and information processes, and artificial intelligence.

Explanation:

hope this helps

brainliest plz

Answer:

computer science

Explanation:

which statements describes the size of an atom

Answers

answer:

A statement that I always think about to understand the size of an atom. If you squish a person down to the size of an atom. It will make a black hole. and if you squish the whole Earth. down to the size of a jelly bean it will also make a black hole. This is just a approximation.

-----------------------

I use the scale to understand how small that is I am open to hear more principles if you were talking about math wise that would be glad to help.

if you have anymore questions I will try to answer your questions to what I know.

.

XYZ Medicomplex hospital have recently installed a large computer system having a high performance processor and about 25 PCs attached with the processor through a Local Area Network (LAN). You have been selected as Information System Auditor and are asked to perform an audit ffor the hospital. What are the important steps you have to go through for this audit? Write your answer in maximum 200 words.

Answers

Obtaining background information, understanding the controls, designing the audit plan, compliance testing of controls, usage of analytical review techniques, a summary of evidence, and assessment and opinion are all phases in an information systems audit process.

What are the steps involved in Information System Audits?

The phases of information system audits are given as follows:

Phase 1: Assessment Planning

During this phase, we plan the information system coverage to meet the audit goals given by the Client while also adhering to all applicable laws and professional standards.

Phase 2: Risk Evaluation And Business Process Analysis

The chance of an act or event occurring that might have a negative impact on the organization and its information systems is referred to as risk. Risk may also refer to the possibility that a certain threat will exploit weaknesses in an asset or collection of assets, resulting in asset loss or harm. It is usually calculated by combining the effect and the chance of occurrence.

Phase 3 - Audit Work Execution

The Information Systems Audit Standards demand us to offer supervision, acquire audit evidence, and record our audit activity when performing audit work.

Phase 4: Final Reporting

The Information Systems Auditor is obliged to prepare an adequate report presenting the outcomes of the IS Audit following the completion of the audit test.

Learn more about information system audits:
https://brainly.com/question/26936081
#SPJ1

When assigning a value to a string, which of the following rules needs to be followed?

Answers

Answer:

Let's say you need to remember some information, the way moviegoers tried to remember the name of the movie. Instead of storing it in your human memory, you can store information in your computer's memory using Python. This is called assigning a string value to a variable.

To assign a string value to a variable in Python, follow this example. Select each part of the code to see how it works with the movie title example.

movieTitle = "Live. Die. Repeat."

This line of Python code is an example of an assignment statement. In an assignment statement, you tell Python, "This variable is assigned this string value."

Explanation:

TRUE or FALSE: HTML is used to style web pages.

Answers

Answer:

TRUE

Explanation:

The answer is true hope this helped

According to the video, what type of company is most likely to employ a full-time Webmaster?
O a large company with a lot of Internet business
a small company that operates a physical store
O a large company that does a lot of in-person business
a medium-sized company that uses database software frequently

Answers

Answer:

A

Explanation:

edge

Answer:

A

Explanation:

marianne needs to create a version of her slide presentation that does not include all the slides and will be used for a particular audience. what is the best way for her to achieve this ?

Answers

Answer:

Marianne needs to create a version of her slide presentation that does not include all the slides and will be used for a particular audience. What is the best way for her to achieve this? A.) Use the Custom Show dialog box to create a new custom show

A set of object that share a common structure and common behavior in database is called ​

Answers

An Object Class. Hopefully this answer is right.

The catch clause ________. follows the try clause contains code to gracefully handle the exception type listed in the parameter list starts with the word catch followed by a parameter list in parentheses containing an ExceptionType parameter variable The catch clause does all of these

Answers

Answer:

all of these

Explanation:

The catch clause satisfies the following:

1. It starts with the word catch followed by a parameter list in parentheses containing an Exception Type parameter variable.

2. It follows the try clause.

3. It contains code to gracefully handle the exception type listed in the parameter list.

So, option ''all of these'' is correct

Other Questions
Please help this is due today Mustapha maintains a monopoly in the holographic TV market because of its patent, but it is about to expire. The market demand and Mustapha's production cost are given by: P = 100 -0.5Q and TC = 100+ 0.5Q The market price is (please put your answer in numerical values without any dollar sign, comma or decimal place). The market quantity is (please put your answer in numerical values without any comma or decimal place). The monopoly profit is (please put your answer in numerical values without any dollar sign, comma or decimal place). direct and indirectmother why are you lead from school a myth mother why are you late from school Amit Part A (2 marks) Does call provision increase or decrease bond price? Explain the reason. Part B (2 marks) Compared to bond, why is share more challenging to value? A 71.0 kg football player is gliding across very smooth ice at 2.20m/s . He throws a 0.430 kg football straight forward. a) What is the player's speed afterward if the ball is thrown at 13.5 m/s relative to the ground? b)What is the player's speed afterward if the ball is thrown at 13.5 m/s relative to the player? 3. Take a screen shot with: b = 1, a = 0, and only C = 1 4. Explain how #3 only allows Q to be a 13. Take a screen shot with: b = 1, a = 0, and only C = 1 4. Explain how #3 only allows Q to be a 13. Take a screen shot with: b = 1, a = 0, and only C = 1 4. Explain how #3 only allows Q to be a 1 The ____________ muscle attaches by itself on the radius and the interosseous membrane. who is Vlusp plz help all about him Answer the following above: -68 divided (-4)Help ASAP your sister has run away,write a description for her to the police help 10 points 4 paragraph Marty buys 12 ounces of granola marty paid $ how much for 3/4 of a pound of granola. Consider the set F of continuous functions f with the property that f'(2) = 0. a. Name a larger real vector space we've studied this semester that F is a subset of. b. Prove whether F is a subspace of the vector space you named in part a. C. We learned this semester that if something is a subset of a known vector space, we only need to check two axioms instead of 10. Explain why we can get away with not checking the other 8 axioms. Don't just quote the rule we learned-try to explain the logic behind it. d. Why was it not ok to only check the two subspace axioms on problem 8 from exam 2? Why wasn't it a subspace? which of these is a symbol to look for in A raisin in the sun Which of the following graphs shows the image of the figure below after a dilation with a scale factor of 2, centered at (-2, -2)?NO LINKS! Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? What is the meaning of theword pilot in the followingexcerpt from section 2?2- "So by and by I ran away. Isaid I never would come homeagain till I was a pilot andcould come in glory..."A. The person who flies a plane.B. The person who drives a car.C. The person who steers a boat. please answer this correctly Evaluate the given integral by changing to polar coordinates. D x2y dA,where D is the top half of the disk with center the origin and radius is 4. What is the straight-line distance in miles between Barrow, Alaska, and Murmansk, Russia?