1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
1 year ago
12

The tcp protocol provides error detection and correction. a. True b. False

Computers and Technology
1 answer:
ANEK [815]1 year ago
4 0
B. False

Explanation

TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.
You might be interested in
The relational database is the primary method for organizing and maintaining data today in information systems. It organizes dat
levacccp [35]

Answer:

A key field is used to uniquely identify each record for retrieval or manipulation.

Explanation:

In a database there are many, having similar entities. So in order to differentiate each entity from other we need to set a key field among all the field which is always unique for each entity.

For example:

In a database of a company having data about its employees, the key field might be their ID. As some employees can have same names, addresses, phone numbers but cannot have the same ID.

5 0
3 years ago
Website managers use____ every day.
babymother [125]

Answer:

technology

Explanation:

4 0
3 years ago
Read 2 more answers
When people talk about "the media," they often mean:?
chubhunter [2.5K]
Storage Media such as usb flash drives, internal and external hard drives and even back-up tapes
4 0
2 years ago
1 punto
sergey [27]

Answer:

c Proceso productivo

Explanation:

3 0
3 years ago
5 differences between a regular mouse and a gaming mouse​
alexdok [17]

Answer:

A gaming mouse has more buttons to keybind to while a regular mouse is simpler

Explanation:

6 0
2 years ago
Other questions:
  • In number theory, a perfect number is a positive integer that is equal to the sum of its proper positive divisors, that is, the
    12·1 answer
  • 11. John wants to share resources and move a large volume of data quickly over the Internet. John should use which of the follow
    14·1 answer
  • 8.13 LAB: Elements in a range Write a program that first gets a list of integers from input. That list is followed by two more i
    8·1 answer
  • There are many modes of remote visual communication. which is the most common mode
    5·1 answer
  • What is the output?<br> &gt;&gt;&gt; password = "sdf#_356"<br> &gt;&gt;&gt; password.isalnum()
    8·2 answers
  • Examples of application software​
    7·2 answers
  • Sharl downloads images from an online library and uses them in her work. The images are shared under the Creative Commons Attrib
    13·1 answer
  • Helpppppppppppppppppppppppppppppppp
    13·2 answers
  • Look at the picture ​
    13·2 answers
  • 1.Microsoft Word is a/an ........​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!