The process of TCP flow control is implemented by altering ________

A) Window sizes
B) Packet sizes
C) Datagram sizes
D) The DSCP field


A
Explanation: A) The TCP receive window can be altered by the destination device. It gives an amount of data that it is willing to buffer before an acknowledgment is required; the larger the window, the faster the data will be received.

Computer Science & Information Technology

You might also like to view...

Critical Thinking QuestionsCase 3-1 The second image is a digital photograph and a color cast has occurred. How can you improve the photograph's color? a. change the color saturationc. apply recolor effectsb. change the color toned. reshoot the picture

What will be an ideal response?

Computer Science & Information Technology

What information can you get from the Details tab and the Properties dialog box for your selected PID?

What will be an ideal response?

Step 1. Access PowerShell console.
a. Click Start. Search and select powershell.

b. Click Start. Search and select command prompt.
Step 2. Explore Command Prompt and PowerShell commands.
a. Enter dir at the prompt in both windows.
b. Try another command that you have used in the command prompt, such as ping, cd, and ipconfig.
Step 3. Explore cmdlets.
a. PowerShell commands, cmdlets, are constructed in the form of verb-noun string. To identify the PowerShell command to list the subdirectories and files in a directory, enter Get-Alias dir at the PowerShell prompt.
```
PS C:UsersCyberOpsUser> Get-Alias dir
CommandType Name Version
Source
----------- ---- -------
------
Alias dir -> Get-ChildItem
```
b. For more detailed information about cmdlets, navigate to https://technet.microsoft. com/en-us/library/ee332526.aspx.
c. Close the Command

Computer Science & Information Technology

____ software is generally defined as the software that allows you to be productive in an office setting.

A. Application B. Commercial C. System D. Productivity

Computer Science & Information Technology

The information that antivirus software uses to identify and remove malware is referred to as a virus ____.

A. flag B. signature C. definition D. scan

Computer Science & Information Technology