1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
1 year ago
5

Which network protocol is used to handle the reliable delivery of information?

Computers and Technology
1 answer:
abruzzese [7]1 year ago
3 0

Answer:
TCP

Explanation:

In the OSI Model's seven layers, a transmission control protocol (TCP). Which basically means, if a packet of information requested to be received gets lost and does not make it to it's destination. This protocol exists for the recievent user to request another packet of the one missing. This way no information is lost.

When this action cannot find the correct packet. This instance is called packet loss, and can cause many bugs and visual glitches in games or software needing the information from those packets.

You might be interested in
_________________: informal messages that are passed on from person to person
sasho [114]

Answer:

Grapevine is the answer

4 0
3 years ago
What is the part of a CSS declaration that describes the HTML tag?
jeyben [28]

Answer:

a selector

Explanation:

4 0
3 years ago
The rangevalidator object on a web form has a type property for identifying the type of data for the range, such as ____.​
mojhsa [17]
<span>numbers,  dates, currency or strings - The range validator in a web form helps check whether the value entered in the field falls between the minimum and maximum values allowed in that field. For example if the type of data accepted  is of date type, then the rangevalidator checks whether the entered date falls within the given range. That means, month entered should be between 1 and 12, etc.</span>
8 0
3 years ago
All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym
RoseWind [281]

Answer:

Data use policies

Explanation:

Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.

4 0
3 years ago
What does gigabyte mean
son4ous [18]
A unit of information equal to one billion {109} or, strictly 230 bytes
4 0
3 years ago
Other questions:
  • Drag each storage device to its category.
    7·1 answer
  • You are the IT administrator for a small corporate network. Recently, you added a web server that runs services that need to be
    12·1 answer
  • Which property is assigned to a file by the operating system?
    13·1 answer
  • How can you know if the person or organization providing the information has the credentials and knowledge to speak on this topi
    13·1 answer
  • Speech about society being normal
    12·1 answer
  • Plssssssssssssss help quick
    8·1 answer
  • Graphics created within Illustrator CC are always vector graphics true or false
    9·1 answer
  • Helppppppppppp please
    5·2 answers
  • Rectangle perimeter is 72 .Find the new perimeter if length is doubled and breadth is tripled​
    7·1 answer
  • 11. Explain different types of program control with suitable flow chart.<br> N
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!