A server process in Host B has a welcoming socket at port 977. What will trigger the server process to create a connection socket?

Answers

Answer 1

Answer:

Explanation:

This connection socket will be created when Host B receives a TCP SYN segment that contains the destination port number 977. This means that there is data that is trying to enter through that port number, as a welcoming socket this destination is available and when data requests access through it the OS creates a connection socket using Host B in order to allow access to the TCP SYN segment.


Related Questions

uestion
7. If you want to learn how to perform an action, which feature of the Excel window should you use?

A. Quick Access toolbar
B. Tell Me box
C. Status bar
D. File tab

Please help ASAP

Answers

Answer:

B- tell me box

Explanation:

It tells you how to do something you don’t know how to do

Can someone help me to write a python code to save list form python to CSV file please?​

Answers

f = open("MyFileName.csv", "w")

lst = ["Hello", "Hi", "Bye"]

f.write(str(lst))

f.close()

I didn't necessarily know what you meant by list form. This program works for me in pycharm. I had to install the CSV plugin though. If you encounter any errors, I'll try my best to help you.

2. Suppose you and your friend want to exchange lecture notes taken during class. She has an iPhone and you have an iPad. What is the easiest way to do the exchange?
a. Cope the files to an SD card and move the SD card to each device.
b. Drop the files in OneDrive and share notebooks with each other.
c. Send a text to each other with the files attached.
d. Transfer the files through an AirDrop connection.

Answers

Answer:

d. Transfer the files through an AirDrop connection.

Explanation:

I feel like im not sure 100%

But i hope it helps!

HAPPY THXGIVING!

A new version of your operating system is released with several changes made to the transport layer protocols. Specifically, TCP has been removed completely but UDP was not changed. What specific changes must be made to your application to accomodate these changes?

Answers

Answer:

Throughout the description section down, the overview and per the instance.

Explanation:

Throughout terms of communicating and maintaining a link between the application as well as the network, TCP protocols were essential. The program would not be linked or activated if the TCP has indeed been fully disabled. The essential TCP protocol that enables the application to be linked from over network become HTTP as well as HTTPS. Almost all of the significant protocols needed to operate some programs are based primarily on TCP protocols. Besides, as SSH would not operate as a TCP protocol, the OS would not be remotely linked.

Therefore, that would also make it impossible for all the administrators to operate upon this system.

2. Write the output of:
a) CLS
A= 10
B = 20
C = 30
S=A+B+C
Av=S/3
Print "sum is:",s
Print "Average is:", Av
End​

Answers

sum is 60 (add a b and c together)
average is 20 (divide 60 by 3)

what is the norm that psychoanalysis of Freud deviates?

Answers

Answer:

Freud deviates from the norm of current mainstream psychology which has more or less lost its way - if it ever had one - under the influence of the same pressures which produce our dysfunctional politics and our troubled societies at large (technological change, globalisation, and so on).

Explanation:

Creds to Quora

Channel logging tokens can be set to all but:________. a. Relaxed b. Strict c. Both versions d. None

Answers

Answer:

c. Both versions

Explanation:

The Windows Remote management has hardening levels that could be set to Relaxed, Strict, or None based on the channel binding token associated with a request. This feature could be automatically found in the system or manually configured to a user's choice.

Relaxed settings mean rejection of channel binding token that are not valid and the acceptance of requests with no channel binding tokens, but which may be susceptible to attacks. Strict settings entail an automatic rejection of invalid channel binding tokens. None settings entail the acceptance of all requests with no protection against credential-forwarding attacks.

what are the characteristics of 1st generation computers​

Answers

Answer:

Used vacuum tubes for circuitry.

Electron emitting metal in vacuum tubes burned out easily.

Used magnetic drums for memory.

Were huge, slow, expensive, and many times undependable.

Were expensive to operate.

Were power hungry.

Explanation:

 

Answer:

Characteristics of first generation computers:

Explanation:

1)First generation computers used vacuum tubes.

2)Speed was slow and memory was very small.

3)They were huge in size taking up entire room.

4)They consumed a lot of power and generated so much heat.

5)Machine language was used in these computers.

6)Output was obtained on printouts through electric typewriter.

7)Input was based on punched cards.

8)First generation computers were expensive and unreliable.

E-mails could possibly cause harm to computers due to which of the following?
A.Allow for misunderstandings
B.Carrying viruses
C.Updating system preferences
D.Allowing for global use

Answers

D or b
I’m pretty sure sorry if I’m wrong

E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers.

As we know,

You receive emails every day with papers, pictures, or other electronic files attached. These files can occasionally include harmful viruses, Trojan horses, or malware that has been purposefully provided by someone looking to inflict harm or steal confidential personal data.

Thus, E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

Learn more about computers here:

brainly.com/question/21080395

#SPJ2

Pleases Help ME An example of a _________________ impact is when a product is back ordered and the business contacts the customer via email to let them know of the new ship date.


A)Negative



B)Positive

Answers

Answer:

positive

Explanation:

it shows good customer service

Is this right? I’m not sure

Answers

Yeah indeed it is. Good job!!

what are the advantages of using a folder?​

Answers

Answer:

1. easy access to files

2. better organization

Explanation:

Sequential and direct access are two methods to locate data in memory. Discuss why major devices now a days use direct access? How can we convert data that is written on a device that supports only sequential access to a device that only support direct access method?

Answers

Answer:

Direct data access reduces the speed of retrieving data from memory or storage. Retrieving data and storing it in a cache memory provides direct access to data in the storage.

Explanation:

Sequential memory access, as the name implies, goes through the memory length location in search of the specified data. Direct memory access, provides a memory location index for direct retrieval of data.

Examples of direct and sequential memory access are RAM and tapes respectively. Data in sequential memory access can be access directly by getting data in advance and storing them in cache memory for direct access by the processor.

Write in Java:
Given a long integer representing a 10-digit phone number, output the area code, prefix, and line number using the format (800) 555-1212.

Ex: If the input is:
8005551212

the output is:
(800) 555-1212

Hint: Use % to get the desired rightmost digits. Ex: The rightmost 2 digits of 572 is gotten by 572 % 100, which is 72.

Hint: Use / to shift right by the desired amount. Ex: Shifting 572 right by 2 digits is done by 572 / 100, which yields 5. (Recall integer division discards the fraction).

For simplicity, assume any part starts with a non-zero digit. So 0119998888 is not allowed.

LabProgram.java:

import java.util.Scanner;

public class LabProgram {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
long phoneNumber;
// Add more variables as needed

phoneNumber = scnr.nextLong();

/* Type your code here. */
}
}

Answers

import java.util.Scanner;

public class LabProgram {

public static void main(String[] args) {

   Scanner scnr = new Scanner(System.in);

   long phoneNumber;

   phoneNumber = scnr.nextLong();

   long areaCode =  phoneNumber/10000000;

   long prefix = (phoneNumber/10000)%1000;

   long lineNumber = phoneNumber%10000;

   System.out.println("("+areaCode+")"+prefix+"-"+lineNumber);

}

}

I hope this helps!

Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3

Answers

Full question:

Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque 2 elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3

Answer and Explanation:

If you instantiate a capacity of 10 for the queue, you have the queue a capacity of not more than 10 values.

To enqueue means to add an element to the array(if it's not full, n<10)

To dequeue means to delete an element from the array or queue(if n! =0)

From the question, for example:

We create a queue of capacity 10:

Queue q(10);

We add elements/enqueue 5 elements to the queue :

q.queueEnqueue(10);

q.queueEnqueue(5);

q.queueEnqueue(8);

q.queueEnqueue(9);

q.queueEnqueue(2);

If we print this out:

q. queueDisplay()

We would get:

10, 5, 8, 9, 2

We remove elements/dequeue 2 elements from the queue :

q. queuedequeue();

q. queuedequeue();

We print it out:

q. queueDisplay()

8 ,9, 2

We observe that deletion/dequeue starts from the front/first index.

We are left with indices 2, 3, 4 or 2 to 4

Note: the above methods/ functions and objects used are merely for example purposes. The queue uses a floating front design approach.

If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.

Answers

Question

If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.

A) passed by constant reference

B) passed by reference

C) passed by value

D) none of the above

Answer:

The correct answer is B)

Explanation:

The above question relates to computer programming.

Passing by reference is the same and can be used interchangeably with  passing by address.

A special ID used by a computer's procesing unit for recording or tracking data is referred to as a memory address.

When the memory address of a calling function is passed on to the function, the function is said to have been passed by address or reference.

This enables changes to be made to the function or argument directly from the parameter.

Cheers

meaning of leanness in organization​

Answers

Answer:It is an organizational structure that is designed to create more customer value using fewer resources than a traditional organisational structure

what are the principle elements of public key cryptosystem​

Answers

Answer: Components of a Cryptosystem

- Plaintext. It is the data to be protected during transmission.

- Encryption Algorithm. ...

- Ciphertext. ...

- Decryption Algorithm, is a mathematical process, that produces a unique plaintext for any given ciphertext and decryption key. ...

- Encryption Key. ...

- Decryption Key.

Explanation:

What computer part it this? Explain to get brainliest. People that don't explain, won't get it, but will get a thanks + a 5 star rate.

Answers

Answer:

That is a motherboard, a circuit board containing the main components (CPU, RAM, etc) of a computer. It contains connectors in which other circuit boards can be slotted into.

Explanation:

A motherboard is a specialized circuit board (a thin board containing a electrical circuit) used for containing major components of a computer and allowing the parts to be used in conjunction with each other. This is why you'll find a motherboard in a large variety of computers, from phones, to PC's and laptops.

Answer: Motherboard.

Explanation: it's the backbone of a computer, it ties all the computers components together.

Are the blank space around the edges of the page

Answers

Answer:

The blank space around the edges of a sheet of paper — as with the page of a book — that surrounds the text is called the margin.

Which of the following represent the use of formatting to create readable code?
Choose all that apply.

Line breaks are used to separate every ten lines of code.

Line breaks are used to separate segments of code.

Indentation is used to create a pattern that is easy to follow.

Indentation is used to make it easier to follow the flow of logic in the code.

Answers

Answer:

The true statements are:

Line breaks are used to separate segments of code.

Indentation is used to create a pattern that is easy to follow.

Indentation is used to make it easier to follow the flow of logic in the code.

Explanation:

Line breaks and indentation are used to increase the readability of a program. The coding formatting is done using the line breaks and indentation to separate segments of code so that the code is easier to read.

Hence,

The true statements are:

Line breaks are used to separate segments of code.

Indentation is used to create a pattern that is easy to follow.

Indentation is used to make it easier to follow the flow of logic in the code.

Answer:

b and d

Explanation:

Write the function which takes an arbitrary real number p , and returns true if the numeber is equals to some power of 2, i.e. p=2n for some n . Your task is to implement a recursive function power_of_2 withount using loops and library functions.

Answers

def power_of_2(p):

   if p == 2:

       return True

   elif p < 2:

       return False

   return power_of_2(p/2)

print(power_of_2(32))

The function keeps dividing the number by 2 until it is equal to 2 or the number ends up being less than 2. If at some point the number is equal to 2, it is a power of 2 otherwise it's not a power of 2.

For which input values will the following loop not correctly compute the maximum of the values? 1. Scanner in = new Scanner (System.in); 2. int max =

Answers

Answer:

The answer is "Option d".

Explanation:

Please find the complete question in the attached file.

Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2​

Answers

Python

def getResults():

   radius = float(input())

   pi = 3.1415

   volume = 4/3 * pi * radius ** 3

   surfaceArea = 4*pi * radius ** 2.0

   print (volume)

   print (surfaceArea)

getResults()

C#:

       public static void Main(string[] args)

       {

           getResults(Convert.ToDouble(Console.ReadLine()));  

       }

       public static double[] getResults(double radius)

       {

           double radiusObj = radius;

           double volume = 1.33333333333 * Math.PI * Math.Pow(radiusObj, 3);

           double surfaceArea = 4 * Math.PI * Math.Pow(radiusObj, 2) ;

           double[] surfaceAndVolume = { volume, surfaceArea };

           Console.WriteLine(volume.ToString());

           Console.WriteLine(surfaceArea.ToString());

           return surfaceAndVolume;

       }

Java:

public static void main(String[] args)

   {

       Scanner  scanner = new Scanner(System.in);

       getResults(scanner.nextDouble());

   }

   public static double[] getResults(double radius)

   {

       double radiusObj = radius;

       double volume = 1.33333333333 * Math.PI * Math.pow(radiusObj, 3);

       double surfaceArea = 4 * Math.PI * Math.pow(radiusObj, 2) ;

       double[] surfaceAndVolume = { volume, surfaceArea };

       System.out.println(volume);

       System.out.println(surfaceArea);

       return surfaceAndVolume;

   }

what is the advantages of your solutions ​

Answers

Answer:

One of the key benefits of using IT solutions is that they provide the opportunity to use the latest technology in the market. This is because the IT solution always offers the best equipment and technologies in the market, and also, they are upgraded at zero additional costs.

Explanation:

____________________________ and _________________________ are 2 positive impacts of the internet on businesses.

A)Competition and Easy Marketing


B)Improved Communication and Worrying security


C)Improved Communication and Increased unnecessary competition


D)Improved Communication and Easy Advertisement

Answers

D improved comms and easy ads

Answer:

D)due to it we can have more profit with less time and wide area communication

wordList is a list of words that currently contains the values ["tree", "rock", "air"]
Which of the following lines will result in the list containing the values ["air", "rock", "air"]
A. wordList[0] = wordList[2]
B. wordList[2] = wordList[O]
C.insertitem(wordList, O, "air")
D. removeltem(wordList,0)

Answers

Answer:

A. wordList[0] = wordList[2]

Explanation:

Required

Which line would give ["air", "rock", "air"]

From the question, we have that:

wordList =  ["tree", "rock", "air"]

which means that:

wordList[0] = "tree"

wordList[1] = "rock"

wordList[2] = "air"

Analyzing the options.

A. wordList[0] = wordList[2]

This will assign the item in wordList[2] to wordList[0].

and the result would be

So:

wordList[0] = "tree"

would change to

wordList[0] = "air"

The new content of wordList would then be ["air", "rock", "air"]

Option (A) answers the question

The list variable wordList contains three string values, Hence, to obtain the list, ["air", "rock", "air"], the lines wordList[0] = wordList[2] would be used.

List values are indexed from 0 ; hence, tree = index 0 ; rock = index 1 ; air = index 2

To assign the the string "tree" to index 0, then wordList[2] is assigned to wordList[0].

wordList[0] is now "air"

Hence, the required line of code would be wordList[0] = wordList[2]

Learn more :https://brainly.com/question/19117781

Partner Exercise: Implement a class Car with the following properties. A car has a certain fuel efficiency (measured in miles/gallon or liters/km – pick one) and a certain amount of fuel in the gas tank. The efficiency is specified in the constructor, and the initial fuel level is 0. Supply a method drive that simulates driving the car for a certain distance, reducing the amount of gasoline in the fuel tank. Also supply methods getGasInTank(), returning the current amount of gasoline in the fuel tank, and addGas(), to add gasoline to the fuel tank. Sample usage: Car myHybrid = new Car(50); // 50 miles per gallon myHybrid.addGas(20); // Tank 20 gallons myHybrid.drive(100); // Drive 100 miles double gasLeft = myHybrid.getGasInTank(); // Get gas remaining in tank You may assume that the drive method is never called with a distance that consumes more than the available gas. Supply a CarTester class that tests all methods.

Answers

50:20 I got it right

what is the purpose of the new window command

Answers

Answer:

.

Explanation:

Answer:

It opens one of the current worksheets into a new window.

Explanation:

got it correct

do you think the governmentshould allocate moremoney to HIV/AIDS orphans​

Answers

Answer:

Abstract

Objective Through a descriptive study, we determined the factors that influence the decision-making process for allocating funds to HIV/AIDS prevention and treatment programmes, and the extent to which formal decision tools are used in the municipality of KwaDukuza, South Africa.

Methods We conducted 35 key informant interviews in KwaDukuza. The interview questions addressed specific resource allocation issues while allowing respondents to speak openly about the complexities of the HIV/AIDS resource allocation process.

Other Questions
What type of organism carries out photosynthesis?A) autotrophB) heterotrophC) prokaryotes D) eukaryotes Write 321.35 in scientific form. WILL GIVE BRAINLIEST!!1. Write a haiku about your favorite season.answer: The Crusades began soon after the Seljuk Turks threatened which of the following Christian nations? A. the Kingdom of France B. the Byzantine Empire C. the Kingdom of England D. the Holy Roman Empire How did minstrel shows portray African Americans? a. As proud and free Americans C. As wealthy industrialists b. As foolish imitators of white culture d. As respected but poor farmers How is carbon cycled In a simulation on earth, an astronaut in his space suit climbs up a vertical ladder. On the moon, the same astronaut makes the same climb. In which case does the gravitational potential energy of the astronaut change by a greater amount? what fraction is not equivalent to 9/12 A. 16/24 B. 15/20 C. 6/8 D. 24/32 Which of the following examples is most clearly narrated in third-person omniscient point of view?A. She went from room to room and shouted her warning at the train's passengers, all whom seemed startled.B. He looked up from his meal and noticed that everybody had left. How did this keep happening?C. What did she mean by that? He searched her face for answers, but her gaze was, as always. impenetrable.D. Bert always assumed that he was an only child, but little did he know that he had a long lost sister. Starting from rest, a coin and a ring roll down a ramp without slipping. Which of the following are true:A. The ring reaches the bottom first B. The coin reaches the bottom first C. The coin and the ring arrive at the same time D. The one the reaches the bottom first is the one with the largest mass E. The one that reaches the bottom first is the one with the largest diameter. The ratio of BMX bikes in a sporting goods store to mountain bikes is 3 to 2 . The store has 90 BMX bikes . How many mountain bikes does the store have ? What is Acrocyanosis Write an equation in slope-intercept form that goes through (12, 4) and (20,8). Read the excerpt from Roll of Thunder, Hear My Cry. For the month of January I was Lillian Jean's slave and she thoroughly enjoyed it. She even took to waiting for me in the morning with Jeremy so that I could carry her books. When friends of hers walked with us, she bragged about her little colored friend and almost hugged herself with pleasure when I called her "Miz" Lillian Jean. What does the excerpt show about the historical time period of the story? A.It shows that there were African American citizens who treated white citizens in unjust and humiliating ways. B. It shows that white children treated African American children as equals even if white adults in the community did not.C. It shows that African American children and white children easily developed friendships in spite of racial injustice. D.It shows that there were white citizens who treated African American citizens in unjust and humiliating ways. I need to write essay about "Pardon the turkey" and it's my first time writing an essay and it's very hard and also please include Hook and bridge in it. I don't need thesis. and if you write the essay you'll get 25 points please help A bag of candy contained the flavors strawberry, orange, cherry, and lemon. Zelda drew eachpiece of candy out of the bag and recorded the frequency of each.Which candy's experimental probability is closest to its theoretical probability? Which are brainstorming techniques check all that apply On April 1 the ABC Inc. paid $20,400 to Acme Realty for 12 months Rent beginning May 1. The company did the correct recording on April 1. If financial statements are prepared on December 31st, what is the adjusting entry needed on the balance sheet?Decrease PrePaid Rent 20,400 / Increase Rent Expense 20,400Decrease PrePaid Rent 13,600 / Decrease Rent Expense 13,600Decrease PrePaid Rent 13,600 / Increase Rent Expense 13,600Decrease Cash 20,400 / Increase PrePaid Rent 20,400 Suppose that United States produces 10,000,000 barrels of oil and 1,000 bushels of wheat each week. Suppose that Pakistan produces 9753 barrels of oil and 9753 bushels of wheat each week. 1. In autarky, what is the largest amount of wheat United States can consume every week? Number bushels 2. What does the term autarky refer to? a) The process of negotiating terms of trade between two countries. b) A major argument against globalization. c) countries Government policies meant to reduce international trade. d) A situation where one country does not engage in trade with other V5. Suppose you invest $5,000 at 9% interest, compounded annually, for 10 years. Determine the future value of your investment, using the compound interest formula.