Which pdu is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model?.

Answers

Answer 1

The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment.

What is this PDU about?

Note that in the transport layer, a host computer is said to often de-encapsulate  what we call a segment so that they can be able to put back data to an acceptable or given format through the use of the application layer protocol that belongs to the TCP/IP model.

Therefore, The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment as it is the right thing to do.

Learn more about host computer from

https://brainly.com/question/553980


Related Questions

You come across a useful and free reporting utility which can be easily downloaded from the internet to create appealing reports for your project. Will you go ahead and install it?

Answers

When I come across a free reporting utility which can be easily downloaded from the internet I will not download and install it in my computer system.

What is a reporting utility?

A reporting utility is an application that can be used to create reports for projects which can save time for a company.

The disadvantage of downloading a free reporting utility is that it can be a malware in a disguise which when downloaded can cause harm to the data of your company.

Therefore, When I come across a free reporting utility which can be easily downloaded from the internet I will not download and install it in my computer system.

Learn more about malware here:

https://brainly.com/question/23294592

#SPJ1

What code will correctly create a hypertext link to a page named dogs.html. Assume the html page in which you are placing the code is in the same directory as the dogs.html page.

Answers

Links are specified in HTML using the <a>tag. A link or hyperlink could be a word, group of words, or image. Anything between the opening <a> tag and the closing </a>tag becomes the part of the link that the user sees and clicks in a browser. Here are some examples of the links: The hrefattribute specifies the target of the link. Its value can be a

Why is it necessary that Computer 1 run Windows Professional or a higher edition to implement the security used in this lab

Answers

Computer 1 includes a number of defensive measures, including identity protection, threat resistance, and information protection, to ensure that if one fails, another is ready to counter an damage.

What is defensive measures?

The word "defensive measure" refers to any action, device, procedure, signature, technique, or other measure used to identify, prevent, or neutralize a known threat to an information system or information stored on, processed by, or traversing an information system.

Thus, Computer 1 includes a number of defensive measures.

For more details about defensive measures, click here

https://brainly.com/question/5961251

#SPJ1

The following assignment statement instructs the computer to initialize a variable with int data type.

howMany = 0

A. True
B. False

Answers

The given assignment statement instructs the computer to initialize a variable with int data type: True.

The kinds of data type.

In Computer programming, there are five (5) common data types and these include:

Integer type (int)Floating point type (float)Boolean (bool)String (str)Integer type (int)

Basically, an integer type (int) is used for storing whole numbers such as 0, 1, 2, 3, 4, etc. Thus, the assignment statement "howMany = 0" would instruct the computer to initialize a variable with int data type.

Read more on a data types here: brainly.com/question/25619349

#SPJ1

when you save a presentation with a .potx file extension, which type of powerpoint file is created?

Answers

A file with the POTX file extension is a Microsoft PowerPoint Open XML Template file used to maintain the same layout, text, styles, and formatting across multiple PPTX files.

When you save a presentation with a .potx file extension, the type of PowerPoint file that is created is known as .PPTX file.

What do you mean by Presentation?

The presentation may be defined as an activity in which someone expresses, describes, or explains something to a group of people in order to explore the given facts and understandings. The person who presents is known as the speaker, while the person who listens is known as the audience.

A POTX file is a presentation template created by PowerPoint, a program that significantly allows users in order to create slide show presentations. It contains default styles, text, layout, and formatting. POTX files are utilized in order to create multiple .PPTX files with the same formatting.

Therefore, when you save a presentation with a .potx file extension, the type of PowerPoint file that is created is known as .PPTX file.

To learn more about Presentation, refer to the link:

https://brainly.com/question/24653274

#SPJ5

Which tab contains the Spell Check feature?

1. View
2. Review
3. Page Layout
4. Insert

Answers

Answer:

In excel, the review tab, answer no 2

The tab that contains the spell check feature is 2. Review

Write three different ways to declare and instantiate a String object called “myString” and containing “abc”


For the Eclipse Java IDE

Answers

The ways in which one can declare and instantiate a String object called “myString” and containing “abc” are given below.

What is a String Object in Programming?

A string is a predefined class that is provided by so many programming languages, including C, C++, Java, Erlang, etc.

A string is a collection of characters that include spaces. It can be described as a one-dimensional array of characters terminated by the NULL character ('0').

The ways in which one can decalre and instantiate a string object defined above are:

A) String myString = "abc";

B) String myString = new String("abc");

C) char temp myString =  char temp ("abc");

Learn more about String Objects at;
https://brainly.com/question/14743310
#SPJ1

To create a datetime object for the current date and time, you can use theGroup of answer choicestoday() method of the date classtoday() method of the datetime classnow() method of the date classnow() method of the datetime class

Answers

var theDate = new DateTime (DateTime.Today.Year, DateTime.Today.Month, DateTime.Today.Day, hours, minute, second);

PLS HURRY 43 POINTS

Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.

surveil people’s digital behavior
promote access to information
manage the internet
limit access to digital information
provide efficient internet searches

Answers

Answer:

surveil people’s digital behavior

promote access to information

provide efficient internet searches

Explanation:

i just know things

When you program in Scratch, what are two things you can do with a sprite?
A. Drag it to the scripts area
B. Add it to another variable
C. Change the costume on it
D. Make it move
SUBM

Answers

Explanation:

You can change the costume and drag it to the script area

You can change the costume and drag it to the script area.

What is Script area?

Visual programming is used in Scratch to make your own games, tales, and animations. A script is a group of instructions used to program in Scratch. It is a group of interconnected blocks stacked on top of one another.

As users choose to engage with sprites, the blocks of instructions are thoughtfully arranged to carry out a certain purpose. It's a good idea to include script comments that explain what is happening.

A sprite in Scratch is an actor, the main character of the program, or a graphic component that carries out all the tasks specified in the script.

Therefore, You can change the costume and drag it to the script area.

To learn more about Script area, refer to the link:

https://brainly.com/question/6975460

#SPJ7

Data files whose records are always retrieved in sequence from the beginning of the file are known as

Answers

Answer:

sequential files

Explanation:

Q:

Data files whose records are always retrieved in sequence from the beginning of the file are

A:

sequential files

Suppose we have the list: list = [1,2,3,4,5,6]

(Python) What would the list look like after the following code: list[3] = 10

Answers

1, 2, 3, 10, 5, 6 is the answer

What technology has seen the largest increase in venture funding for products and services related to well-being and care delivery?.

Answers

The technology has seen the largest increase in venture funding for products and services related to well-being and care delivery is Tech startups.

Why do venture capitalists invest in the use of technology?

Venture capital funds are known to be firms or people that are said to often invest in things or tech that can bring a lot of  substantial returns on any of their invested capital.

Due to the above, Tech startups are known to have a special characteristics that make them a good  technology investment for venture capitalists.

Learn more about technology from

https://brainly.com/question/25110079

#SPJ1

Which are good reasons to use a database? Select all that apply.
A to find data in a large dataset
B to perform calculations with data
C to store large datasets
D to find answers to questions about the data

Answers

Databases are used to find data in large sets, store large informational sets, and answer the questions that are present in the data set. Thus, options a, c, and d are correct.

What is a database?

A database is a systematized compilation of the information and the data set that is stored physically on electronic devices like a computer system. DBMS controls the databases.

Databases can be based on the hierarchy, or network, or can be object-oriented. They store the electronic form of the data set in an organized manner.

Therefore, databases stores data sets.

Learn more about the database here:

https://brainly.com/question/14101897

#SPJ1

This is an example of what type of formula?

=(D1-D17)

Question 3 options:

ADDITION


SUBTRACTION


RANGE


AVERAGE

Answers

Answer:

Subtraction

Explanation:

That is subtracting the values of two cells.

You know because of the "-" sign

PLEASE HELP WILL MARK BRAINLIEST
A programmer ensures the user inputs valid data by setting

algorithms
boundaries
data
output

Answers

I believe it’s boundaries
boundaries probably but i could be wrong

why computer is called versatile memory? ​

Answers

Answer:

Versatility: The capacity of the computer of performing more than one task at the same time is called the versatility of a computer. Versatility means the capacity to perform different types of work completely. Storage: The computer has a mass storage section where we can store a large volume of data for future use.

Explanation:

Use the Image below to answer this question.
At your company, you need to have telephone conversations transmitted over the existing data network using VoIP. Your manager
directs you to complete this project as follows:
1. Use the phone's ports to daisy chain the PCs to the rest of the network.
2. Do not use the regular power outlets to power the phones.
The list on the left displays several cable types and devices that may be required in this scenario. Drag each cable type or device on
the left to the corresponding location identified in the image.
items on the left may be used more than once.

Answers

Since the image is not given, answer will be subjective. Check more below.

What is VoIP communication?

The Voice over Internet Protocol (VoIP), is known to be a kind of a technology that helps a person to be able to make voice calls.

Note that this can be done through the use of a broadband Internet connection and one do not need to use  any analog  phone line.

Learn more about VoIP  from

https://brainly.com/question/14255125

SPJ1

A cloud computing service model whereby one or more computing environments suitable for use in application development and testing are provided as a turnkey, on-demand service. is known as _____.

Answers

A cloud computing service model whereby one or more computing environments suitable for use in application development and testing are provided as a turnkey, on-demand service. is known software-as-a-Service (SaaS).

What is Cloud computing?

Cloud computing refers to programs and offerings that run on an allotted community the usage of virtualized sources and accessed via way of means of not unusual place Internet protocols and networking standards.

Software-as-a-Service (SaaS) is a version of carrier shipping wherein one or greater programs and the computational sources to run them are furnished to be used on call for as a turnkey carrier. Its principal cause is to lessen the overall fee of hardware and software program development, maintenance, and operations.

Read more about the cloud computing service :

https://brainly.com/question/19057393

#SPJ1

7. licenses show people how content creators would like their work to be used.
o a. intellectual property
o b. phishing
o c. spamming
o d. creative commons

Answers

Intellectual property licences outline the intended uses of content providers' creations.

Which licences make it clear how the creators of content want their work to be used?

Everyone, from small businesses to major institutions, now has a standardised approach to offer the public permission to use their creative works in accordance with copyright laws thanks to Creative Commons licences.

Which kind of licence enables content producers to allow for the reuse of their work while maintaining their copyright?

By giving specific permissions to others to share, utilise, and/or build upon their creative works, Creative Commons copyright licences enable authors to maintain their ownership of their intellectual property. Creators assign them to their own works. The purpose of CC licences is to allow for the adaptation, sharing, and reuse of educational resources.

To know more about content visit:-

https://brainly.com/question/28589374

#SPJ1

solve the expression 4*3/ (5+2) 7%4

Answers

Answer:

36/7

Explanation:

First, multiply 4 and 3 then add 5 and 2 the answer you will get is 12/7, and then calculate 7%4 answers you will get is 3 now multiply 12/7 and 3 your answer will be 36/7

What is the point of comments in code? Discuss at least two possible uses of code, including specific examples of what a comment might “look like.”

Answers

Answer:

Better collabaration and helping find bugs.

Explanation:

When working with a group of people, comments help the other person understand what you are doing.

Ex. //cat sprite

Also, it helps find bugs. For example, if the cat sprite is not working that means you know it has something to do with that peice of code.

Which of the following should you choose for the tables?
A one table called Populations and another table called Cities
B one table called Primary Industry, a second table called States, and a third table called Cities
C one table called States and another table called Cities

Answers

Answer:

A first table, population and cities

Explain why it is wise to memorize your social security number.

Answers

It is memorize your social security number as one can be able to recur it for any given purpose if one did not carry it along with them.

Why memorize your social security number?

The reason why it is important to memorize your social security number is that by doing so, one do not need to carry or use their card again.

Conclusively, Note that It is not the card but the number that is very important and as such it is vital that one knows their Social Security number that is the nine digits number off heart and in cases of emergencies when one forgot to carry their cards.

Learn more about social security number from

https://brainly.com/question/5213237

#SPJ4

Describe the role of a distributed file system in a job execution environment such as MapReduce in a large-scale cloud system. g

Answers

Answer:

allows users of physically distributed systems to share their data and resources

Explanation:

The main purpose of the Distributed File System (DFS) is to allows users of physically distributed systems to share their data and resources

The do/while loop is generally used when the program loop should run at least once before testing for the stopping condition true false

Answers

Answer:

In the do-while loop, the body of a loop is always executed at least once. After the body is executed, then it checks the condition.

Explanation:

If the condition is true, then it will again execute the body of a loop otherwise control is transferred out of the loop.

Many who move to business-oriented information security were formerly__________ who were often involved in national security or cybersecurity .

Answers

Answer:

The information security function

Explanation:

Many who move to business-oriented information security were formerly_____ who were often involved in national security or cybersecurity . All of the above The information security function

A person wants to transmit an audio file from a device to a second device. Which of the following scenarios best demonstrates the use of lossless compression of the original file?
A. A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it.
B. A device compresses the audio file by removing details that are not easily perceived by the human ear. The compressed file is transmitted to a second device, which plays it.
C. A device transmits the original audio file to a second device. The second device removes metadata from the file before playing it.
D. A device transmits the original audio file to a second device. The second device plays the transmitted file as is.

Answers

The answer is that A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version.

What is an compresses an audio file?

To compresses an  audio file is a term that connote the act of making an audio file to be smaller in size so as to fit into a given device or app.

Note that the option that best demonstrates the use of lossless compression of the original file is that A device compresses the audio file before transmitting it to a second device. The second device restores the compressed file to its original version before playing it and as such, option A is correct.

Learn more about audio file from

https://brainly.com/question/2561725

#SPJ1

help please will give brainliest!!!!!!!!!

Answers

Answer:

Take a String.

Convert it into array of characters.

Apply for loop till length of char array.

Using isDigit() method we can check the digits in string.

If isDigit() will return true then print that index value.

That digit is in char form. ...

Using sum variable, we will sum it.

Explanation:

What’s unique about New Cashierless stores?

Answers

There’s no cashiers, meaning if you need help you got to figure it out alone.
Other Questions
What is the wavelength of a wave that has a frequency of 60 Hz and a speedof 45 m/s?O A. 0.75 mO B. 15 mO c. 1.3 mD. 2700 m What are stars made of? What is the measure of angle BOC, in degrees? In Saudi Arabia, their life styles aredetermined byA. The GovernmentB. Where They LiveC. Their Parents Which point is Lincoln trying to make? O As time passes, people will not remember the speech of the soldiers, O The progress made by the soldiers has more impact than words, O The world does not care about the soldiers' actions Speeches have more importance and lasting power than actions Find the value of each variable in the parallelogram. Please solve this question for Algebra 2 In a popular online role playing game, players can create detailed designs for their character's "costumes," or appearance. Fatoumata sets up a website where players can buy and sell these costumes online. Information about the number of people who visited the website and the number of costumes purchased in a single day is listed below.7 visitors purchased no costume.143 visitors purchased exactly one costume.16 visitors purchased more than one costume.Based on these results, express the probability that the next person will purchase no costume as a fraction in simplest form. PLSSS HELP IF YOU TURLY KNOW THISS please help i have to write and i dont understand The equation of the line which passes through the point (3, 7) and has a gradient of 3 is: which best summarizes the central idea in the excerpt? tan believes that language should be thought of as a communication tool. tan believes that some forms of english are more powerful than others. tan enjoys using language to manipulate the feelings and thoughts of readers. tan enjoys thinking about language and using different forms of english. Identify the terms and like terms in the expression 14-8^2-6-10x Given cos= -[tex]\frac{7}{9}[/tex] and tan Jason is painting a large circle on one wall of his new apartment. the largest distance across the circle will be 8 feet. approximately how many square feet of wall will the circle cover? how can the process melting and cooling of magma affect the rock cycle Kylie bought a $1,600 tablet using a credit card. If Kylie has to pay an additional $8 each month for interest, and it takes 4 months to pay off, how much will Kylie spend total for the $1,600?coinsYou can earn 3 coins What were some advantages of joining together to form clans and tribes in the Aztec empire? A stack of 14 cookies is 23.1 centimeters high. How think is each cookie?I already got that answer which was 1.65 but the question I dont understand isUse your answer in Part A to find how thick a stack of 10 cookies would be?A. 371B. 16.5C. 10.5D. 20.5 please help me in this question please