1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
2 years ago
9

Is TCP really more secure than other L4 protocols by default?

Computers and Technology
1 answer:
yulyashka [42]2 years ago
3 0

Answer:

Yes TCP is

Explanation:

You might be interested in
Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services ove
Annette [7]

Answer:

3. ISDN

Explanation:

ISDN ( Integrated Services Digital Network  ) -

It is the used for the simultaneous digital transmission of network service , data , video and voice , instead of the old circuits of the public switched telephone network ( PSTN ) , is referred to as ISDN .

The characteristic feature of ISDN is that it integrates the data and speech on the same lines , which is not possible in PSTN .

Hence, from the given information of the question,

The correct option is ISDN .

8 0
3 years ago
The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is
Sergeu [11.5K]
164.109.0.0/17




-------------------------------------------
6 0
3 years ago
Which risk mitigation framework allows scope for research and acknowledgement for risk mitigation?
hjlf
The answer is that by establishing the framework<span> for the management of risks, the basic parameters within which risks must be managed are defined. Consequently, the </span>scope<span> for the rest of the </span>Risk Management<span> process is also set. </span>
6 0
4 years ago
Read 2 more answers
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
Irina-Kira [14]

Answer:

A. True.

Explanation:

In this scenario, you are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In USA, the Presidential Policy Directive 19 (PPD-19) which was signed by President Barack Obama in October 2012, is an executive order designed to provide significant protection for an employee who have access to classified informations such as fraud, waste of money and abuse or prohibiting any form of retaliation against this cleared employee.

3 0
3 years ago
Write short notes on the following:<br>I. keyboard ii.Control unit iii.printer​
Andreas93 [3]

Answer:

- the Keyboard:

The keyboard is a handheld device used to input alphabet, numbers, symbols and characters to a monitor. It also houses the special manipulative and function keys.

- the Control Unit:

The control unit is a component of the CPU which directs the operation of the processor.

- the Printer:

The printer is an external hardware output device which takes electronic data stored on a device and creates a hard copy.

4 0
2 years ago
Other questions:
  • What is the difference between Data and information?​
    7·1 answer
  • The means by which you interact with any program on a computer is called the ____. Answer
    5·1 answer
  • When you are working on an unsaved document on a PC, where is the document temporarily saved?
    5·1 answer
  • Assuming that the message variable contains the string "Happy holidays", the statement message.find("days"); returns a. -1b. 10c
    6·1 answer
  • How to reinstall windows 7 on my pc,without format,because i don't want to loose my data,and can u give me a windows 7 setup ple
    8·1 answer
  • A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provi
    7·1 answer
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    5·2 answers
  • What is distribution hardware?
    14·1 answer
  • Windows stores information from the Credential Manager application in secure folders called
    5·1 answer
  • Why is it better for a CPU to have more than one cache?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!