A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?

Answers

Answer 1

Answer:

Closed

Explanation:

When a connection has been terminated and no communication is possible between the communicating network devices, the Transmission Control Protocol (TCP) socket would be closed.


Related Questions

How is IT used in entertainment to make cartoon movies

Answers

Answer:

Forensic animation is a branch of forensics in which animated recreation of incidents are created to aid investigators & help solve cases. Examples include the use of computer animation, stills, and other audio visual aids.

hope you will get this answer correct

c programming question


Given n, take the sum of the digits of n. If that value has more than one digit, continue reducing in this way until a single-digit number is produced. The input will be a non-negative integer.

Answers

Answer:

int digitSum(int n) {

int sum = 0;

while (n) {

 sum += n % 10;

 n /= 10;

}  

return sum < 10 ? sum : digitSum(sum);

}

int main()

{

int n = 12345;

printf("Digit sum of %d is %d\n", n, digitSum(n));

}

Explanation:

The recursion takes care of the repeated summing in case the sum has more than 1 digit.

Portable computer, also known as laptop computer, weighing between 4 and 10 pounds is called a. Internet b. Scanner c. Printer d. Notebook computer​

Answers

Explanation:

portable computer also known as laptop computer weighting between 4 to 10 pounds is called a Notebook computer.

c) Explain GIGO briefly.​

Answers

Answer:

Is is also a computer science acronym that implies bad input will result in bad output. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

IT'S FORMULA IS GIGO: GARBAGE IN GARBAGE OUT...

HOPE IT'S HELPFUL FOR U!!

AND PLZ MARK ME AS BRAINLIEST IF U LIKE THIS ANSWER!!!!

If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer:

remain  calm during the conversation

Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario

Answers

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

It is used to select specific menu options, drag and drop options and to draw something on screen.

Answers

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

What is the difference, if any, between a project manager and a producer on a digital media production team? A project manager oversees the entire project, while the producer just oversees the creative element. A project manager just oversees the creative element, while a producer oversees the entire project. A project manager is in charge of the people involved in the project, while the producer secures the funds. A project manager secures the funds for the project, while the producer is in charge of the people involved.

Answers

Answer:

A project manager just oversees the creative element, while a producer oversees the entire project.

It is B

Answer:

b

Explanation:

got it right on the quiz

How to execute python code in command prompt *window*?

Iam using sublime text 3 and want to execute my python code in command prompt.
This is my current build system:

{
"cmd": ["python", "$file"],
"selector": "source.python",
"file_regex": "^\\s*File \"(...*?)\", line ([0-9]*)"
}

But I want my program to open in command prompt window and show the result there. I dont want to see the result in sublime text. Please help.

Answers

Answer:

Open Command Prompt and type “python” and hit enter. You will see a python version and now you can run your program there

Which of these is an example of an IT career? (ik I'm trash at this kinda stuff)


Select all that apply

A

game designer


B

network engineer


C

graphic designer


D

cashier

Answers

Answer:

not d

Explanation:

IT is info tech, so it's most likly a or c(I'mma go witn c), but then again b is possible, but c still sounds most reasonable(I think)

how do I answer question

Answers

Answer:

To answer a question on brainly, there is a add answer button below the question. Please look at the attached, it shows you the add answer button.

Explanation:

Once you click on add answer, brainly will take you to something that looks like a note and all you have to do is type the answer and explanation. Once you do that, click on the add your answer button on the top right corner, and your answer will be posted.

what are the means of hardware security?​

Answers

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

Explanation:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

what is robotic technology

Answers

Answer:

according to britannica :

"Robotics, design, construction, and use of machines (robots) to perform tasks done traditionally by human beings. ... Robots are widely used in such industries as automobile manufacture to perform simple repetitive tasks, and in industries where work must be performed in environments hazardous to humans"

Explanation:

You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing

Answers

Explanation:

denial of service attacks (dos)

Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

What is Electronic jamming?

This is known to be a kind of  electronic warfare that is the use of jammers that shows interfering signals toward an enemy's system and thus it often blocks the receiver.

Therefore, Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

Learn more about jamming from

https://brainly.com/question/17488276

#SPJ9

A java program is composed of data members and functions.​
true or false ?

Answers

Answer:

true

Explanation:

What is meaning of geo and bio​

Answers

Answer:

Geo means Earth and Bio mean life

¿Cuál es la ventaja principal de una tabla dinámica?

Answers

Explanation:

Ventajas de las tablas dinámicas de Excel:

Hacen que los informes sean flexibles y se adaptan a tus necesidades. Son una forma interactiva de resumir rápidamente grandes volúmenes de datos, haciendo mucho más fácil el proceso de análisis y permitiendo encontrar patrones o tendencias.

What is the Sparklines group for in Excel? to place charts in individual cells working with hyperlinks selecting font styles or themes formatting the appearance of the cells or tables

Answers

Answer:

A sparkline is a tiny chart in an Excel worksheet cell that provides a visual representation of data.

a key part of staying safe is employing good habits. drag the step number to the proper sequence triple a

Answers

Answer:

where are the step number. I can't find any

...............is a personal computer that fits on desk.​

Answers

Answer:

desktop computer

Explanation:

what is a common translator?​

Answers

Answer:

Conventional interpretation is the process of converting (simultaneously or sequentially) a word/sentence/paragraph/text from one language to another in spoken form without changing the meaning, helping people who do not share the same language. one language can understand each other.

Explanation:

Answer:

A translator is a programming language processor that converts a computer program from one language to another . It takes a program written in source code and converts it into machine code. It discovers and identifies the error during translation.

The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device

Answers

Answer: Use an SSH client to access the router configuration.

Change the default administrative username and password

Explanation:

Based on the information given, in order to increase the security of the device, it's vital to use an SSH client to access the router configuration. The SSH client refers to the program that helps in establishing an authenticated and secure SSH connections to the SSH servers. It's vital for operating network services securely over a network that's unsecured.

Also, the default administrative username and password should be changed to a more secure username and password which can't be easily known by a third party.

The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

Answers

Answer:

True.

Explanation:

A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.

Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.

Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.

Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.

You have been hired to perform a penetration test for an organization. You are given full knowledge of the network before the test begins. Which type of penetration test are you performing

Answers

Answer:

If you are performing a penetration test with knowledge you are known as a white-hat hacker.

write a program in python to make the figure:-

*
**
****
********
****************
********************************

The first and correct answer will be marked as brainliest......​

Answers

Answer:

Halo mateeeee

look it will be hard to explain the code and steps to you so just refer this video. .

it will help a lott

( *cries* Serena left Ash In pokemon s19 with a k I s s)

https://youtu.be/rUy_Nq9DHTs

A transition is ________.

Answers

Answer:

the process or a period of changing from one state or condition to another.

Explanation:

"students in transition from one programme to another"

What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j < 5; j++) cout << list[j] << " "; cout << endl; Group of answer choices 0 1 2 3 4 0 5 10 15 0 5 10 15 20 5 10 15 20

Answers

Answer:

what?

Explanation:

A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?

Answers

Answer:

I think the answer is 2.

hope it will help you

Because it contains an embedded space

how big is an iphone xr

Answers

Answer:

the iPhone xr display measure in at 6 .1 inches

the phone measures up to 6.1 in

4) Programming a) WAp to find the greatest number among any three numbers.​

Answers

def comp_num (num1, num2, num3):

try:

if num1 > num2 and num1 > num3:

print ( "{0} is the biggest".format(num1) )

elif num2 > num1 and num2 > num3:

print ( "{0} is the biggest".format(num2))

elif num3 > num2 and num3 > num1:

print ( "{0} is the biggest".format(num3))

except ValueError:

return "Invalid input"

num_1 = int (input (" Please enter a number: "))

num_2 = int (input (" Please enter a second number: "))

num_3 = int (input (" Please enter a third number: "))

print (comp_num (num_1, num_2, num_3))

Answer:

this is in qbasic programming

Other Questions
find the measure of the indicated angle to the nearest degree 19. Charlotte has a success rate of about 20%for making baskets in attempts duringbasketball games. She wants to determinethe probability that she will have to make atleast 5 attempts during a game in order tomake a basket. She designed a simulationwhere she spun a spinner that was dividedinto 5 equal sections, one of which wascolored red. She counted how many timesshe had to spin the spinner in each trialbefore it landed on red. The results of her20 trials are shown below.5, 2, 7, 2, 3, 4, 10, 6,4,6,3, 6, 6, 4, 8,5,7,7,1,5According to this simulation, what is theprobability that Charlotte will have tomake at least 5 attempts in order to makea basket? answer i guess i will give brainly for corret answers. An educational software company wants to compare the effectiveness of teaching about supply and demand curves between computer animation presentations and textbook presentation. The company tests the economic knowledge of a number of first-year college students, then randomly divides them into two groups. One group uses the animation and the other studies the text. The company retests all the students and compares the increase in economic understanding between the two groups. Is the study described above an experiment? Why or why not? helpp me solve it and pls explain tyyy Peter is a new business owner. Because Peter is on a strict budget, he uses an older Novell NetWare server. The NetWare server still relies on the legacy IPX/SPX network protocol suite. Peter needs to connect his server to the Internet. He decides to use a gateway instead of a router. What is the likely motive behind Peter's decision Help me please,,,,,, can anyone pls give me a correct answer! i need help! I copied the problem why did pluto not follow the last rule if it could possibly could Evaluate: 2-41O A.looO B.-8O c.116O D.-16 Which of the following statements about the 2011 earthquake off the coast of Honshu, Japan, is false?A. More than 120,000 people were killed.B. The earthquake had a magnitude of 9.0 on the Richter scale.C. Whole cities and towns were washed away.D. The earthquake triggered the F - uk - us - hi - ma accident. (that word i spread out would not let me post this question so i spread it out) Last year at a certain high school, there were 56 boys on the honor roll and 150 girls on the honor roll. This year, the number of boys on the honor roll decreased by 25% and the number of girls on the honor roll decreased by 12%. By what percentage did the total number of students on the honor roll decrease? can someone answer this or am i right Question 1 of 10This diagram shows the triangular trade that developed between Europe,Africa, and the Americas. In which direction did most slaves travel?A. From C to AB. From B to AC. From A to BD. From A to C A thermometer is placed in water in order to measure the waters temperature. What would cause the liquid in the thermometer to drop? The timing device in an automobiles intermittent wiper system is based on an RC time constant and utilizes a 0.500 micro F capacitor and a variable resistor. Over what range must R be made to vary to achieve time constants from 2.00 to 15.0 s? It is claimed that the average child has no time to go to school. For the child spends 8 hours per day,or one third of his/her time sleeping. Based on a 365 day year, thats 121.67days sleeping. Also the child spends three hours per day eating. Thats a total of 45 days in the year spent eating. Also the child spends 90 days taking summer vacation. Also the child spends 21 days on Christmas and Easter holiday. Finally, the child has each Saturday and Sunday off. Thats a total of 104 days. In short, we (rounding to whole days accounted for 122+45+90+21+104=382 days of the year taken up by ordinary child inlike activities. This is already more than the 365 days that are known to comprise a year. We conclude that there is certainly no time for the child to attend school. What is wrong with this reasoning? Boston Railroad decided to use the high-low method and operating data from the past six months to estimate the fixed and variable components of transportation costs. The activity base used by Boston Railroad is a measure of railroad operating activity, termed "gross-ton miles," which is the total number of tons multiplied by the miles moved. Transportation Costs Gross-Ton Miles January $1,454,100 323,000 February 1,621,300 361,000 March 1,145,800 234,000 April 1,554,400 350,000 May 1,303,700 281,000 June 1,671,400 380,000 Determine the variable cost per gross-ton mile and the fixed cost. Variable cost (Round to two decimal places.) $fill in the blank 1 per gross-ton mile Total fixed cost $fill in the blank 2 Based on the wintertime La Nia weather map, what do you think Florida's temperature and precipitation would be like during a winter El Nio event?