A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC

Answers

Answer 1

Answer: 3001.

Explanation:

The Server would acknowledge the 3001 information after it receives two packets of data from the personal computer, which is being used to communicate with the web server of the TCP (Transmission Control Protocol) with a window of 6000.

A TCP is the defined standard which is used for establishing and maintaining a network conversation. this is a medium from which applications programs exchange data.

Answer 2

The TCP is explicitly called the Transmission Control Protocol which allows computing devices to communicate and exchange information by sending packets over a network. Hence, the byte of information acknowledged after receiving 2 packets of data is 3001.

Size perpacket data = 1500 bytes Number of packets sent = 2

The bytes of information acknowledged by the web server can be calculated thus :

Size per packet data sent × number of packets

1500 × 2 = 3000

Therefore, the bytes of information that would be acknowledged by the web server is 3001.

Learn more : https://brainly.com/question/12191237


Related Questions

Write a function password_check() that takes as input two strings newpassword and oldpassword, and accepts the new password (i.e., returns True) if newpassword is different from oldpassword and newpassword is at least 6 letters long. If the new password fails the check, your functions should return False

Answers

In python:

def password_check(newpassword, oldpassword):

   return True if newpassword != oldpassword and len(newpassword) >= 6 else False

Just for clarification, that return statement is on one line. I hope this helps!

Write a method called printIndexed that accepts a String as itsparameter and prints the String's characters in order followed bytheir indexes in reverse order. For example, the call ofprintIndexed("ZELDA"); should print Z4E3L2D1A0 to the console.

Answers

Answer:

def printIndexed(s):

   for i in range(len(s)):

       print(s[i] + str(len(s) - 1 - i), end="")

       

   

printIndexed("ZELDA")

Explanation:

*The code is in Python.

Create a method named printIndexed that takes one parameter, s

Create a for loop that iterates the length of the s times

Inside the loop, print the characters from starting and indexes from the end

Note that in order the print the current character, you need to use indexing. s[i] refers to the current character of the string (the value of the i starts from 0 and goes until length of the s - 1). Also, to print the indexes from the end, you need to subtract the i from the length of the s - 1

For example, in the first iteration, i = 0:

s[i] = s[0] = Z

len(s) - 1 - i = 5 - 1 - 0 = 4

A mutex lock is released immediately after entering a critical section. Group of answer choices True False

Answers

Answer:

False

Explanation:

The mutex lock should be purchased at the time when it would be entered in the critical section and it is released when it leaves the critical section

Also for improving out the critical resources synchronization among various processes, the mutex locks would be implemented

Therefore the given statement is false

Hence, the same is to be considered

Answer:

False

Explanation:

[tex] \: [/tex]

[tex] \: [/tex]

PEASE ANSWER QUICKLY

What is the value of the variable moneyDue after these lines of code are executed? >>>numSodas = 2 >>>costSodas = 1.50 >>>moneyDue = numSodas * costSodas

The value of moneyDue is ____.

Answers

90
I calculated the sodas

Answer:

3.0

Explanation:

I input 90 and it was not correct, the answer is 3.0 (correct on Edg 2021) :D

Functions of a microcomputer

Answers

Answer:

Many functions can have less amount of storage can have a small CPU could have smaller mother board units and also have different types of programming

Doors and windows are important compositional elements that impact the facade of a building True False​

Answers

Answer:

true

Explanation:

PLEASE HURRY!!!
Look at the image below!

Answers

The first, third, and last are correct.

PLEASE HURRY!!!
Look at the image below!

Answers

The value of category will be normal because the if statement is false and the first elif statement is false but the second elif statement is true.

True/False Using a RADIUS server with RRAS means that the local server database will be used to authenticate users for accessing the local network

Answers

Answer: True.

Explanation:

A RADIUS Client ( Radius Authentication Dial or Network Access Server) are networking device which works like a (VPN concentrator, router, or a switch) they are used to authenticate users. A RADIUS Server runs as a background process that is used on a UNIX, and Windows server. It mains purpose is to maintain user profiles on a central database.

what are the commonly used computer categories.

Answers

Answer:

PCs (Personal Computers) with Microsoft Windows

Explanation:

i used google. hope this helped!!!

Data mining is an integral part of knowledge discovery in database (KDD), which is the overall process of converting ____ into _____. a. primary data / secondary data b. input data / output data c. raw data / useful information d. input data / data fusion

Answers

Answer:

c. raw data / useful information

Explanation:

Data mining can be described as the cat of converting raw data into useful information.

In simple terms it can be defined as the process of extracting usable data from a much larger set or data(raw). This is done through the use of various softwares that support the process.

Through data mining patterns, anomalies, correlations etc are found in the data which is then used in the prediction of likely outcomes.

Which physical activity can you perform at the office to avoid strain?
A.
blink your eyes often
B.
cycling
C.
physiotherapy
D.
resting for long hours

Answers

D. Because otherwise you work yourself overtime which is unhealthy for the body :D

Answer:

ill say eyes because straining your eyes hurts so a

Explanation:

Alina needs to e-mail an Excel spreadsheet to a colleague. What is the best method to send the file if she does not want the colleague to easily make changes to the original file?

selecting Send Using E-mail and sending a link
selecting Send Using E-mail and sending as a PDF
selecting Send Using E-mail and sending as an attachment
selecting Send Using E-mail and sending as a published document

Answers

Answer:

B

Explanation:

Which of the following are labels used to identify illustrations such as tables, charts and figures in a document?
O Headers
O Footers
O Captions
O Citations

Answers

There are data which are given charts, tables and illustrated by the help of some labelling. This labelling helps us to identify the data and makes us understand what the data says.

This labelled data has to be given some name and thus in order to represent the figures in a document. This term caption is given to those data sets in the form of tables and illustrations.

Hence the option C is correct,

Learn more about the labels used to identify the tables, charts and figures in a document.

brainly.in/question/11644668.

11000011 00010011 00111010 00011101 / 00010010
In this example of IP address, determine: class, hostID, netID.

Answers

Answer:

Just imagine asalt rifle XD it be firing salts.....need some salt? Ask the asalt rifle.

Explanation:

What is a ribbon or ribbions in Microsoft Word?

Answers

A set of toolbars at the top of the window. Design to help you quickly find the commands.
A set of toolbar at the top of the window.

Some systems automatically delete all user files when a user logs off or a job terminates, unless the user explicitly requests that they be kept. Other systems keep all files unless the user explicitly deletes them. Discuss the relative merits of each approach.

Answers

Answer:

Follows are the Scenario to this question:

Explanation:

Scenario 1:

Removing files trying to follow patient problems is effectively preserving a lot of bandwidth unless defined. Because the device doesn't allow unnecessary data to also be saved, and All system storage is also protected.

Its system efficiency also is increased as its device erases data which are not needed around the same time.

Scenario 2:

It is possible that its consumer unintentionally keeps forgetting to save information, and in that case, the user may lose a lot. Everything is therefore deleted before ensuring its customer.

Its machine may also be closed down due to varying any or even all model calibration, so that storage capacity helps to restore as the backup is still preserved.

Write the HTML code to make the text "Learn Magic" link to a page called "magic-tricks.html”.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The below code is written in HTML

************************************************************************************************

 <!DOCTYPE html>

<!--html start from here and this is comment line -->

<html lang="en-US">  

<body> <!--html body start from here -->

<!-- a link attribute is given below that links another file (magic-tricks)  in the same folder -->  

<p><a href="magic-tricks.html">Learn Magic</a></p>

</body><!--html body end at here -->

</html>

<!--html end at here and this is comment line -->

*************************************************************************************************

When you run this code, it is neccessary     for you to create another html file in same folder and named it "magic-tricks". When you will run the code into any browser and link "learn magic" will appear, as you will click on it "magic-tricks.html" file will get open.

     

Which three actions can be done to panels to customize a user's Photoshop space?
Report them
Show them
Cast them
Separate them
Nest them

Answers

Answer:

Show them

Separate them

Nest them

Explanation:

In Photoshop space, the three actions that can be done to panels to customize a user's space is to show them, make them visible then nest them, and separate them.

Consider a 16 GByte memory (16G locations each holding one byte). What is the number of address lines (N)?

Answers

Answer:

Number of address lines (N) = 34

Explanation:

16G locations each holding 1 byte

           byte

1g    1 - 1 - 1 - 1 - 1 - 1 - 1 - 1

2g

3g

.

.

.

16g

note that; 1 byte = 8 bit

therefore for 16G location, address line(N) will be:

since it is known that [tex]2^{N}[/tex] = 16G   ,and   1 gigabyte = [tex]2^{30}[/tex] byte

∴ 16G = 16 × [tex]2^{30}[/tex]

          = 2⁴ × 2³⁰

          = 2³⁴

since [tex]2^{N}[/tex] = 16G

∴    [tex]2^{N}[/tex] = 2³⁴

N = 34

4. What is the output of the following code snippet? void prevnext(int a, int& prv, int nxt) { prv = a - 1; nxt = a + 1; } int main() { int a = 100; int b = 0;

Answers

Answer:

Previous = 99, Next = 101

Explanation:

Given that a = 100

Previous says that it's formula is a - 1, where a = 100.

Therefore, previous code would show in its output as 100 - 1. 100 - 1 = 99.

Thus, the output of previous code will be 99

Like with previous, Next says that it's formula is a + 1, where a = 100.

Therefore, the next code would show in its output as 100 + 1. 100 + 1 = 101

Thus, the output of previous code will be 101

I hope that's explanatory enough. Thanks.

A technology-literate knowledge worker: A. knows how and when to apply technology B. is a computer savvy worker C. knows all computer programming languages D. is knowledgeable about emerging technology

Answers

Answer:

A. knows how and when to apply technology

Explanation:

Technology can be defined as a branch of knowledge which typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life. Technologies are applied to many fields in the world such as medicine, information technology, cybersecurity, engineering, environmental etc.

A technology-literate knowledge worker knows how and when to apply technology. This ultimately implies that, someone who is well grounded or informed about a technology understands how and when to apply technology.

Basically, knowing how to use a technology simply means he or she understands the appropriate method or technique to be used in the application of a technology such as when solving a problem. Also, knowing when to use a technology means to know the appropriate time to use a particular technology without it having any repercussion or adverse effect.

Answer:

A

Explanation:

Think about it like this:

A literate person in writing doesn't just know letters, they know how to put them together. Now put that in terms of computers.

Which type of programming language translates all lines of code together and then executes them at once?

Compiled
Interpreted
Machine
Python

Answers

Answer:

Compiled

Explanation:

Which data type is -7?
O string
O int
O float
O single

Answers

Answer:

It's an int... Choose B

Answer:

int

Explanation:

correct on edge

Given this instruction mix and the assumption that an arithmetic instruction requires 2 cycles, a load/store instruction takes 6 cycles, and a branch instruction takes 3 cycles, find the average CPI.

Answers

Answer:

2.6

Explanation:

I am assuming that for any given program, that 70% of it's executed instructions happen to be arithmetic, another 10% happen to be load/store, and finally, a 20% happen to be branch. If so, then I can say

Average CPI =

3Σi=1 Percentage of instructions * CPI

Average CPI = (0.7 * 2) + (0.1 * 6) + (0.2 * 3)

Average CPI = 1.4 + 0.6 + 0.6

Average CPI = 2.6

A computer provides each process with 65,536 bytes of physical address space divided into page-frames of 4096 bytes. A particular program has a text size of 32,768 bytes, a data size of 16,386 bytes, and a stack size of 15,870 bytes. Will this program fit in the address space?

Answers

Answer:

No, we require 17 pages but we have only 16 pages available

Explanation:

As computer provide allocated address space is 65,536 which is 2∧16 bytes and page size is 4096 bytes which is 2^12 bytes.

Therefore, the number that can be formed with each 4096 bytes are 16 pages (2^16 / 2^12 = 2^4).

That program text size is 32,768 bytes which is equal to 8 pages (32768/4096 = 8).

The data of the program require 16386 bytes which is equal to 5 pages (16386/4096 = 4.005) and the stack of that program require 4 pages (15870/4096 = 3.875).

Therefore, the program requires 17 pages but have only 16 pages that's why it doesn't fit in address space.

write a C recursion function that can determine if a given number is a prime number. Must use recursion. g

Answers

A number is classified as a prime if it is greater than one and is divisible only by one and by itself. Only natural numbers are classified as prime. Before knowing more about the prime number, it is important to remember some rules of divisibility, which help in the identification of which numbers are not prime.

Code:

#include <stdio.h>

int prime_number(int, int);  

int main()

{

   int num, tmp;

   printf("Input any integer number: ");

   scanf("%d", &num);

   tmp = prime_number(num, num / 2);

   if (tmp == 1)

   {

       printf("%d is a prime number\n", num);

   }

   else

   {

       printf("%d is not a prime number\n", num);

   }

   return 0;

}

 

int prime_number(int num, int i)

{

   if (i == 1)

   {

       return 1;

   }

   else

   {

      if (num % i == 0)

      {

        return 0;

      }

      else

      {

        return prime_number(num, i - 1);

      }        

   }

}

Write a Java program that does the following: Prompts the user to input five decimal numbers Prints the five decimal numbers Converts each decimal number to the nearest integer Adds the five integers Prints the sum and average of the five integers

Answers

import java.util.Scanner;

public class Main {

 public static void main(String[] args) {

   Scanner myObj = new Scanner(System.in);

   float arr[] = {0,1,2,3,4};

   String txt[] = {"first", "second", "third", "fourth", "fifth"};

   for (int i=0;i<arr.length; i++){

     System.out.println("Enter the " + txt[i] + " number.");

     float num1 = myObj.nextFloat();

     arr[i] = num1;

   }

   for (int w = 0; w< arr.length; w++){

     System.out.println("The " + txt[w] + " number is " + arr[w]);

     arr[w] = Math.round(arr[w]);

   }

   System.out.println(" ");

   for (int w = 0; w < arr.length; w++){

     System.out.println("The " + txt[w] + " number is " + arr[w]);

   }

   System.out.println(" ");

   float total = 0;

   for (float w : arr){

     total += w;

   }

   System.out.println("The sum of the numbers is " + total + " and the average is " + (total / 5));

 }

}

I hope this helps!

T/F 2.In most computers, the operating system is stored on a compact disc.

Answers

Answer:

False

Explanation:

Either a Hard Drive or a SSD would be used to store the OS

Write a Python function to get the first half of a specified string of even length. Suppose the input string is "Python" ,after calling the function, we should see the output "Pyt"

Answers

In python:

def get_even(txt):

   return txt[0:int((len(txt) / 2))]

We can test our function with the following code:

print(get_even("Python")) This returns "Pyt" in the console.

I hope this helps!

Answer:

c

Explanation:

Other Questions
1. The United States government began to help industrial workers under what president?Abraham LincolnJohn F. KennedyDwight D. EisenhowerTheodore Roosevelt What set of transformations could be applied to rectangle ABCD to create ABCD?'Rectangle formed by ordered pairs A at negative 4, 2, B at negative 4, 1, C at negative 1, 1, D at negative 1, 2. Second rectangle formed by ordered pairs A double prime at negative 4, negative 2, B double prime at negative 4, negative 1, C double prime at negative 1, negative 1, D double prime at negative 1, negative 2. Reflected over the xaxis and rotated 180 Reflected over the y-axis and rotated 180 Reflected over the xaxis and rotated 90 counterclockwise Reflected over the y-axis and rotated 90 counterclockwise 4 facts about light waves Complete the sentences with a word from the box.Careful! They are not all used.(surprised interesting interested surprising annoyed bored boring annoying frightening exciting excited frightened tiring worrying worried tired) 1 The TV programme was so.....boring.... that I fellasleep. 2- Children can't concentrate just before the schoolholidays. They're too excited3- A: Hi, Mum!B: Carol! Thank goodness you rang! Where haveyou been? We've been so worried about you!. 4- A: Hello, darling. I've got a present for you.B: For me?A: Don't look so Suprised. I often buy you presents. ________ is traditionally a trickster and a creator in Mexican folklore. The office of management and budget______. Which statement applies to both the recall and referendum processes?The origin of the recall and referendum begins with the legislature.The citizens gather petition signatures as part of both processes.The legislature must approve both before the processes go to the voters.The governor can veto the outcome of a recall or referendum. HELP!!!! BRAINLIESTWHATS THE ANSWER+EXPLINATION Where does translation occur? Which of the following is a political change that was caused by the Great Awakening? What color would Sodium fluoride make in a flame test Which fraction is equivalent to 16.6% HELPPPPP MEEE PLEASESESESESESESES1. Write an equation that represents the table. Protons and electrons are found in the nucleus of an atom. True False Fredrick earned $104 for 8 hours of work. At this rate, how much will he earn for 40 hours of work? What strategy can you use to find symbols?Look for dialogue between characters. Look for objects that are repeated frequently. A. Look at the names of characters. B. Look for conflicts between characters. C. Look at the names of characters. D. Look for conflicts between characters. subskibe 2 mi beg bwother :1k subs befor 2021 wit blu profil pikur _____________ processes are actions that create physical solutions to problems. aProduction Processes bMedical Processes cAgricultural Processes dCommunication Process Write the inequality that best represents the relationship shown on this number line. Explain how you determined the inequality. Probability with discrete random variablesA furniture factory makes a 4-piece desk. Quality control at the factory has randomly sampled numerous desksets and determined the number of damaged pieces in each set.The table below is a partially completed probability distribution for the random variable X, where X representsthe number of damaged pieces in a randomly selected desk set from this factory.X01234P(X) 0.750.140.070.03?What is the probability that a randomly selected desk set contains exactly 4 damaged pieces?P ( X = 4) =Show Calculator