A network has the ability to direct traffic toward all of the receiving service. what provides this ability in the transport layer? ​

Answers

Answer 1

Answer:

Multiplexing is the correct answer

Explanation:

End-to-end communication over a network is done by transport layer.

Provides a logical communication between various application processes running on different hosts and this layer is set in OSI(open system interconnection) model.

Transport layer also manages error and correction and also it provides reliability to users.

Multiplexing gets allowed by the transport layer which enables to transfer messages over a network and also the error and corrected data.


Related Questions

To connect several computers together, one generally needs to be running a(n) ____ operating system

Answers

Answer:

Local Area Network

Explanation:

In the Information technology it is called Local Area Network.

A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email, browsing and Office software. In addition, 25 of them also do a large number of client/server requests into a database system. Which local area network operating system would you recommend?

Answers

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Wh are MOST likley the causes of this issue?

Answers

Answer: is this a real question but I think it would be Ip address hope this helps :)))

Explanation:

The__________is an HTML tag that provides information on the keywords that represent the contents of a Web page.

Answers

Answer:

Meta tag

Explanation:

Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy without having to continually set up an instrument True False

Answers

Answer:

The given statement is "True".

Explanation:

Batter panels seem to be platform frames that are used to temporarily suspend foundations plan threads. These same batter board members look like barriers once built.Its positioning is important for creating a foundation precisely as the plans state since some components of their development would have to be accurate. Placed correctly batter panels guarantee that the boundaries seem to be at the appropriate temperatures as well as positions.

___________ colors come forward and command attention. ______________ colors recede away from our eyes and tend to fall into the background of a design.

Answers

Answer:

"Warm; Cool/receding" is the correct answer.

Explanation:

The color temperature would be referred to as summer and winter upon that color wheel, the hottest becoming red/orange as well as the most cooler always being bluish or greenish.A terminology to define the warmth of the color is termed as Warm colors. Warm hues are prominent as well as lively just like reds, oranges, etc.

Thus the above is the right answer.

Which control program flow options runs to the end of the code block and resumes the break mode at the statement that follows?

Answers

Answer:

Step Out

Explanation:

In the field of computer science, the control flow or the flow of control is defined as the order where the individual statements, [tex]\text{function calls}[/tex] or instructions of a program are [tex]\text{evaluated or executed. }[/tex]

The Step Out control flow program runs to the [tex]\text{end of the code block}[/tex] and it resumes the [tex]\text{break mode}[/tex] at the statement that it follows.

Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for loop. Sort the ArrayList using the method Collections.sort. Output the sorted List. Shuffle the list, and output the shuffled list. Note that Collections (with an s) is a class, while Collection is an interface. The Collections class has many useful static methods for processing interfaces, including the sort method. Search for a name in the list that exists; output the location where it was found. Search for a name that is not in the list. What location is reported? Convert the list to an array using toArray. Output the elements of the array. Convert the array back into a list using asList. Output the elements of the list.

Answers

Answer:

---------------------------

Explanation:

Which tools do you use for LinkedIn automation?

Answers

Explanation:

Automation tools allow applications, businesses, teams or organizations to automate their processes which could be deployment, execution, testing, validation and so on. Automation tools help increase the speed at which processes are being handled with the main aim of reducing human intervention.

Linkedln automation tools are designed to help automate certain processes in Linkedln such as sending broadcast messages, connection requests, page following and other processes with less or no human or manual efforts. Some of these automation tools include;

i. Sales navigator for finding right prospects thereby helping to build and establish trusting relationships with these prospects.

ii. Crystal for providing insights and information about a specified Linkedln profile.

iii. Dripify used by managers for quick onboarding of new team members, assignment of roles and rights and even management of subscription plans.  

Answer:

Well, for me I personally use LinkedCamap to drive more LinkedIn connections, hundreds of leads, sales, and conversions automatically.  

Some other LinkedIn automation tools are;  

   Expandi      Meet Alfred      Phantombuster      WeConnect      LinkedIn Helper  

Hope this helps!

Create a function called GetColors that will accept two parameters. These parameters can only be red, blue or yellow. Your function needs to analyze these two colors and determine the color mix. Make sure your function returns the color mix back to where it was called.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a GetColors method that takes in the two parameter colors of either red, blue or yellow. It combines those colors and returns the mix of the two colors back to the user. A test case has been used in the main method and the output can be seen in the attached image below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       System.out.println(GetColors("yellow", "red"));

   }

   public static String GetColors(String color1, String color2) {

       if (color1 == "red") {

           if (color2 == "blue") {return "purple";}

           else if (color2 == "yellow") {return "orange";}

           else {return "red";}

       } else if (color1 == "blue") {

           if (color2 == "red") {return "purple";}

           else if (color2 == "yellow") {return "green";}

           else {return "blue";}

       } else if (color1 == "yellow") {

           if (color2 == "red") {return "orange";}

           else if (color2 == "blue") {return "green";}

           else {return "yellow";}

       } else {

           return "Wrong Parameters";

       }

   }

}

Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Answers

Answer:

Denial of service attack.

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, DOS attack, etc.

A denial of service (DOS) attack is a form of cyber attack that involves either the exploitation of a software flaw or overwhelmingly floods a computer system in a network with traffic in order to prevent authorized users from performing legitimate activities or transactions.

Some of the ways to prevent vulnerability or cyber attacks in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

2. Which tab is used to edit objects on the Slide Master and layouts?
A. View
B. Insert
C. Shape format
D. Design

Answer is not A. View
It’s B. Insert

Answers

Answer:

it is....insert tab..B

Explanation:

insert tab includes editing options

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security

Answers

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

Explanation:

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

Functions IN C LANGUAGE
Problem 1
Function floor may be used to round a number to a specific decimal place. The statement
y = floor( x * 10 + .5 ) / 10;
rounds x to the tenths position (the first position to the right of the decimal point). The
statement
y = floor( x * 100 + .5 ) / 100;
rounds x to the hundredths position (the second position to the right of the decimal
point).
Write a program that defines four functions to round a number x in various ways
a. roundToInteger( number )
b. roundToTenths( number )
c. roundToHundreths( number )
d. roundToThousandths( number )
For each value read, your program should print the original value, the number rounded to
the nearest integer, the number rounded to the nearest tenth, the number rounded to
the nearest hundredth, and the number rounded to the nearest thousandth.
Input Format
Input line contain a float number.
Output Format
Print the original value, the number rounded to the nearest integer, the number rounded
to the nearest tenth, the number rounded to the nearest hundredth, and the number
rounded to the nearest thousandth
Examples
Example 1
Input 1
24567.8
Output 1
24567.8 24568 24570 24600

Answers

Definitely C I am going to be home in a few wewwww

In C++, objects instantiated on the stack must be returned to program memory through the explicit use of the delete keyword.
a) True
b) False

Answers

Answer:

b. False.

Explanation:

Delete function not used to remove data stored on the stack. It is only used to free memory on the heap. The C++ is programming language used to develop operating systems.

What will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface?

Answers

Answer:

The answer is "Option a and Option f"

Explanation:

The cross-site programming and Server-Side Requests fraud were activities that can have negative effects as these are assaults that directly affect your cloud-based servers via web apps. Although the remainder of an attack could be controlled with these approaches, then they can affect the encryption keys only less.

Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute the ASCII value of each character of the string and sum them up. You will thus need to calculate two sums, one for each string. Then, return true if the first string has a larger ASCII sum compared to the second string, otherwise return false. In your main function, prompt the user to enter two strings with a suitable message and provide the strings to the function during function call. The user may enter multiple words for either string. Then, use the Boolean data returned by the function to inform which string has the higher ASCII sum.

Answers

Answer:

The program in Python is as follows:

def ASCIIsum(str1,str2):

   asciisum1 = 0;    asciisum2 = 0

   for chr in str1:

       asciisum1 += (ord(chr) - 96)

   for chr in str2:

       asciisum2 += (ord(chr) - 96)

   if asciisum1 > asciisum2:

       return True

   else:

       return False

str1 = input("Enter first string: ")

str2 = input("Enter second string: ")

if ASCIIsum(str1,str2) == True:

   print(str1,"has a higher ASCII value")

else:

   print(str2,"has a higher ASCII value")

Explanation:

This defines the function

def ASCIIsum(str1,str2):

This initializes the ascii sum of both strings to 0

   asciisum1 = 0;    asciisum2 = 0

This iterates through the characters of str1 and add up the ascii values of each character

   for chr in str1:

       asciisum1 += (ord(chr) - 96)

This iterates through the characters of str2 and add up the ascii values of each character

   for chr in str2:

       asciisum2 += (ord(chr) - 96)

This returns true if the first string has a greater ascii value

   if asciisum1 > asciisum2:

       return True

This returns false if the second string has a greater ascii value

   else:

       return False

The main begins here

This gets input for first string

str1 = input("Enter first string: ")

This gets input for second string

str2 = input("Enter second string: ")

If the returned value is True

if ASCIIsum(str1,str2) == True:

Then str1 has a greater ascii value

   print(str1,"has a higher ASCII value")

If otherwise

else:

Then str2 has a greater ascii value

   print(str2,"has a higher ASCII value")

You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Mangum is a member of the Managers group. He needs access to the files in the Reports folder, but he should not have any access to the Confidential.xls file. What should you do

Answers

Answer:

Following are the solution to the given question:

Explanation:

The common folder called Report has also been shared. Writing access to a shared folder was given to management group members. Mark is a member of a group of managers. We can access the files within your reporting directory, but you really should not access the Confidential.xls file. We want to add Mark Mangum to our ACL files using Deny permissions on Confidential.xls.

A strategy that adopts interface standards that are defined by and widely used throughout industry to facilitate the update of components with new technology is __________. Open systems Non-developmental items Software-embedded systems Automated Information Systems

Answers

Answer:

The right approach is Option d (Automated information systems).

Explanation:

A technology that collects as well as disseminates knowledge or material throughout a range or variety of computerized systems, they are determined as an Automated information system.Oftentimes virtually minimal individual personal interference is necessary except perhaps construction as well as services.

Other choices aren't related to the given scenario. So the above is the appropriate one.

A ----------------has the least flexibility and is best suited for mass production. It has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.

Answers

Answer:

Job order production

Explanation:

A job order production has the least flexibility and is best suited for mass production.

It also has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.

brainleist please..

Answer -------> Transfer line <---------

please click on the picture look at the PICTURE for the correct answer.

application of printer​

Answers

Answer:

In addition, a few modern printers can directly interface to electronic media such as memory cards, or to image capture devices such as digital cameras, scanners; some printers are combined with a scanners and/or fax machines in a single unit, and can function as photocopiers.

provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses, it does determine which systems are active on the network and what services they offer or what ports are available

Answers

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

In python,
Here's some fake data.
df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],
'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],
'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],
'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],
'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],
'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],
'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],
'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],
'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],
'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],
'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}
I have a list of happiness and six explanatory vars.
exp_vars = ['Happiness', 'LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']
1. Define a variable called explanatory_vars that contains the list of the 6 key explanatory variables
2. Define a variable called plot_vars that contains Happiness and each of the explanatory variables. (Hint: recall that you can concatenate Python lists using the addition (+) operator.)
3. Using sns.pairplot, make a pairwise scatterplot for the WHR data frame over the variables of interest, namely the plot_vars. To add additional information, set the hue option to reflect the year of each data point, so that trends over time might become apparent. It will also be useful to include the options dropna=True and palette='Blues'.

Answers

Answer:

Here the answer is given as follows,

Explanation:

import seaborn as sns  

import pandas as pd  

df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],  

  'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],  

  'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],  

  'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],  

  'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],  

  'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],  

  'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],  

  'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],  

  'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],  

  'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],  

  'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}  

dataFrame = pd.DataFrame.from_dict(df)  

explanatory_vars = ['LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']  

plot_vars = ['Happiness'] + explanatory_vars  

sns.pairplot(dataFrame,  

            x_vars = explanatory_vars,  

            dropna=True,  

            palette="Blues")    

How many ways are there to arrange the letters in the word ALGORITHMS? Note, the letter arrangement does not have to spell a word in the dictionary, but the new word must contain all the letters and each letter can be used only once.

Answers

there are ten letters in the word, so for the first position we can choose out of 10 option.

no matter wich specific option we choose, we will have 9 letters left for the 2nd letter.

and 8 for the third place.

...

when we will have used up 9 of 10 letters, there will be only one option for the last place.

the number of possible decision-paths is therefore given by this expression:

10*9*8*7*6*5*4*3*2*1

wich is 3,628,800

there are quite a few ways to rearrange 10 letters

The sorting method which commands entries in a going to head predicated on each character without regard to space as well as punctuation, therefore there are 3628800 ways.

The word 'ALGORITHMS' has 10 letters. There is no repeated letter so, the first Letter can hold 10 places if we start taking one letter at a time. The second can then hold nine positions, the third can hold eight, and so on.

So, as [tex]\bold{ 10\times 9 \times 8.... \times 3 \times 2 \times 1 = 362,8800}[/tex] ways, we have such a total number of ways.

Learn more:

brainly.com/question/17276660

vacuum tubes produced a large amount of

Answers

Answer: suck

Explanation:

sucktion    

Data representation and interactivity are important aspects of data visualization.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Data visualization are defined as the representation of the data and information in graphical way. The data visualization tool uses charts, diagrams, graphs, maps, etc. to represent and visualized the information and understand the patter or trend in the data.

It is an effective way to interact with the user and works likes a form of a visual art.

Thus interactivity and data representations are the two important aspect of the data visualization.

Hence, the answer is true.

what is Microsoft word

Answers

Answer:

A software where you can document letters, essays or anything really.

Explanation:

Which of the following is a benefit of a digital network?

Security is enhanced.
Multiple devices can be connected.
Users are familiar with the software.
It makes using the internet easier.

Answers

Answer:

Multiple devices can be connected

The social network created through digital technology is referred to as a "digital network." It provides phone, video, data, and other network services for digital switching and transmission.

What is Digital network?

In order to align the network with business demands, it has markets, data networks, and communications networks.

Digital networks' core are networking components like switches, routers, and access points. These tools are used to link networks to other networks, secure equipment like computers and servers connected to organizational networks, and analyze data being sent across networks.

Through cloud-enabled central administration, digital networks provide end-to-end network services for on-premises and cloud space. All network components are monitored, analyzed, and managed by a central server.

Therefore, The social network created through digital technology is referred to as a "digital network." It provides phone, video, data, and other network services for digital switching and transmission.

To learn more about Technology, refer to the link:

https://brainly.com/question/9171028

#SPJ2

In confirmatory visualization Group of answer choices Users expect to see a certain pattern in the data Users confirm the quality of data visualization Users don't know what they are looking for Users typically look for anomaly in the data

Answers

Answer: Users expect to see a certain pattern in the data

Explanation:

Confirmatory Data Analysis occurs when the evidence is being evaluated through the use of traditional statistical tools like confidence, significance, and inference.

In this case, there's an hypothesis and the aim is to determine if the hypothesis is true. In this case, we want to know if a particular pattern on the data visualization conforms to what we have.

what is an RTF file?

Answers

Answer:

The Rich Text Format is a proprietary document file format with published specification developed by Microsoft Corporation from 1987 until 2008 for cross-platform document interchange with Microsoft products.

Other Questions
Match the following properties to the type of wave. 10. A moving van company charges a fee of 35.00 dollars for the truck rental and 25 cents for every mile the truck travels from the loading location. Let y be the cost in dollars for using the truck for x miles. Write the slope-intercept form of the equation. Plz help me with this question Drawing of water molecular formulas 1.Draw molecular structure of water Y+y+y+y rewrite in multiplication v sao cn hc thi ielts Una de las aplicaciones ms importa del electromagnetismo son A jar contains 30 red, 40 blue, and 50 white buttons. You pick one button at random , find the probability that it is blue. Psyllium is prescribed for the client diagnosed with a cardiac disorder to facilitate defecation and prevent straining with bowel movements. The nurse reinforces instructions to the client regarding administration of the medication. Which statement by the client indicates an understanding of the use of the medication Do the activity please it's trigonometry Define and explain the term email. Yumi believes that he has a microchip planted in his brain that allows aliens to control his thoughts and actions. He also believes that law enforcement agencies are trying to hack into this microchip to stop him from telling the world about the existence of aliens. Identify a characteristic of schizophrenia that Yumi is exhibiting. Farrah hasn't been feeling well for several days . She knows her boss isn't super understanding when it comes to calling in sick , and it's a really busy time at work , but she's in rough shape . What should she do? a) Go to work but wear a mask to cover her mouth b) Stay home for at least a day to keep from spreading germs c) Go in but try to avoid coming into contact with others d) Plan to go in but come home after lunch if she doesn't feel better 28.Which countries formed an alliance that would lead to World War I?O Austria-Hungary and FranceO Britain and Germany0 Russia and FranceO Russia and Austria-Hungary VII Rewrite the sentences 2. Haven't you forgot giving the books? Do you .... ..... how to answer rewrites I need the answer explained According to the mantle plume model, hot-spot plumes a. are thought to originate at the crust-mantle boundary. b. stream upward quickly because their hot rock is less dense than the overlying rock. c. partially melt the base of the overlying lithosphere, and the magma that is formed rises toward the surface. d. produce volcanoes that always coincide with a plate boundary. what is the relationship between an enzyme and the substrates it can bind PLEASE HELP will mark BRANLIEST!!!! Functions, f and g are given by f(x)= 3+ cos x and g(x) = 2x, x is a real number. Determine the value of c for which f(g(x))= g(f(x)) where 0 [tex]\leq[/tex]x