1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
1 year ago
5

Which network protocol is used to handle the reliable delivery of information?

Computers and Technology
1 answer:
abruzzese [7]1 year ago
3 0

Answer:
TCP

Explanation:

In the OSI Model's seven layers, a transmission control protocol (TCP). Which basically means, if a packet of information requested to be received gets lost and does not make it to it's destination. This protocol exists for the recievent user to request another packet of the one missing. This way no information is lost.

When this action cannot find the correct packet. This instance is called packet loss, and can cause many bugs and visual glitches in games or software needing the information from those packets.

You might be interested in
If you paste a word document text into an excel spreadsheet, the paste optio allow you to keep source formatting or
castortr0y [4]
I think the answer is c
6 0
3 years ago
An ipv4 address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service
DENIUS [597]

Dynamic Host Configuration Protocol, also known as DHCP.

3 0
2 years ago
A(n) __________ window is an open window hidden from view but that can be displayed quickly by clicking the window's program but
Alex787 [66]
Minimized window

The sign to click is a "-" sign (minus)
4 0
3 years ago
Read the statement and justify your answer. “ICT is important for every field.”
Alja [10]

Explanation:

ICT permeates all aspects of life, providing newer, better, and quicker ways for people to interact, network, seek help, gain access to information, and learn. Besides its presence everywhere, Information and Communication Technology has an immense economic significance.

4 0
3 years ago
Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
Vlada [557]

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

5 0
2 years ago
Other questions:
  • Which of the following is not an algorithm?
    8·1 answer
  • In bankruptcy, most of a debtor’s assets will probably be used to repay unsecured debt
    9·1 answer
  • Write a program that prompts the user to enter the minutes (e.g., 1 billion), and displays the number of years and days for the
    13·1 answer
  • If you will be giving your presentation to an audience, you can practice your presentation by using View, ___________, to rehear
    14·1 answer
  • Select each task that may be completed using a word processor.
    8·2 answers
  • A report has a column of totals, with each total adding to the cell above it. What kind of calculated figure is this?
    15·1 answer
  • How do you answer questions
    15·1 answer
  • If, when asked for a date of birth, the user enters a future date, this error should be caught by a ________ check.
    8·1 answer
  • TP1. लेखा अभिलेखको अर्थ उल्लेख गर्नुहोस् । (State the mea
    15·1 answer
  • In the Unified Process (UP) methodology, most of the Implementation activities occurs during the _____ phase.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!