1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
2 years ago
14

Which network protocol is used to handle delivery of information

Computers and Technology
1 answer:
rodikova [14]2 years ago
6 0

Answer:

TCP

Explanation:

TCP stands for Transmission Control Protocol a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

You might be interested in
Documental acerca de los principales materiales que se emplean en la fabricación de medios técnicos utilizados en una oficina.
Diano4ka-milaya [45]

Answer:

Los equipos técnicos utilizados en una oficina y los principales materiales utilizados en su fabricación son;

Equipo de oficina {}    Material utilizado en la fabricación

1) Impresoras;           {}    Acero, aluminio, alambres de cobre, plástico, rodillos

2) Monitor de computadora; {}   Pantalla de vidrio, plástico, cables, placas de circuito, resortes

3) Escáneres;     {}  Alfombra compuesta, mesa de vidrio, carcasa de plástico, cables

4) Copiador;   {}       Carcasa de plástico, contenedor de tóner, placa de vidrio, cables de alimentación

5) Proyector;    {}    Lente de vidrio y carcasa de metal para lámpara, cables de alimentación

6) Desfibradora; {}    Engranajes de plástico, correa de cadena de metal, rodamientos

Explanation:

4 0
3 years ago
Explain set associative mapping<br>​
gtnhenbr [62]
Set-associative mapping allows that each word that is present in the cache can have two or more words in the main memory for the same index address. Set associative cache mapping combines the best of direct and associative cache mapping techniques.
6 0
3 years ago
1. Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard netwo
arsen [322]

Answer:

A. router

Explanation:

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. The standard networking device Isabella would recommend is router.

3 0
3 years ago
GoInternet, Inc., is an Internet-access service provider that is being forced to manage numerous unwanted e-mail messages from a
marissa [1.9K]

Answer:

The correct answer to the following question is option b.)sends messages involving products of companies previously sued under the CAN-SPAM Act.

Explanation:

This act is an act of Controlling the Assault of Non-Solicited Marketing And Other things.

It is the law that establish the rules for the commercial message and the commercial e-mails, gives recipients right to have the business stops emailing them, and they outline the penalties incurred for those person who has violated the law.

8 0
3 years ago
In the SDLC's third phase, the way in which a proposed information system will deliver the general abilities described in the pr
kifflom [539]

Answer: Detailed

Explanation:

SDLC consist of 7 phases. They are:

1. Planning.

2. System analysis and requirement

3. Design:

4. Coding:

5. Testing:

6. Installation

7. Maintenance

Here we are talking of the third phase. In this phase it is the design phase which consist of high and low level design. Here the preliminary design is included in high level design where it describes the required hardware, software, network capabilities and the modelling of the interface. However the detailed design in low level design will implement the coding and will finding of any errors in the implemented design as described by the preliminary design.

3 0
3 years ago
Other questions:
  • __________ involves analyzing a large amount of data to extract knowledge and insight
    13·1 answer
  • Which network could NOT carry commercial traffic?
    5·1 answer
  • You can execute three main types of linux commands. what are they?
    8·1 answer
  • Assume you're running a query on your orders in the past year. You want to see how many orders were placed after May. What type
    5·1 answer
  • Brainly won't let me create an account even though i tried multiple emails and ages! It keeps saying "We're sorry, but we are no
    8·2 answers
  • Convert the following pseudocode to C++ code. Be sure to define the appropriate variables. Store 25 in the speed variable. Store
    5·1 answer
  • Is it important for a writer to include voice and point of view in writing because...<br> Plz help
    10·1 answer
  • Help it don’t let me click what do I do
    13·1 answer
  • A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *
    13·1 answer
  • Activity #2
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!