1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
2 years ago
12

The tcp protocol provides error detection and correction. a. True b. False

Computers and Technology
1 answer:
ANEK [815]2 years ago
4 0
B. False

Explanation

TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.
You might be interested in
Who can pick up GPS signals
bazaltina [42]

Devices such as TomTom GPS and Garmin GPS pick up a GPS signal


I hope that's help !

5 0
3 years ago
The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.
VARVARA [1.3K]

Answer: Compactness

Explanation:

4 0
3 years ago
Read 2 more answers
A distinguishing feature of methods that have the reserved word void in the method header is that they have:.
aliina [53]

Answer:

no return statements

Explanation:

3 0
2 years ago
What will the tab key do in navigating a table ?
STALIN [3.7K]
Navigating and Selecting within a Table. ... Within a table, the Tab key is used to move between cells, rather than its traditional Word function of inserting tabs. Other helpful keyboard shortcuts for moving around and selecting within a table are explained in this document.
8 0
3 years ago
What are note cards used for?
photoshop1234 [79]
Hello, thank you for your question.

Note cards are little cards that can be used to jot down brief notes you need to remember.  You can also use note cards to annotate what you're reading in a book.
8 0
3 years ago
Other questions:
  • How does coding work on computers?
    6·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the
    13·1 answer
  • A school at which you are likely to be accepted because you meet graduation requirements is called a:
    5·1 answer
  • The following program segment is designed to compute the product of two nonnegative integers X and Y by accumulating the sum of
    9·1 answer
  • Write a loop to output the word EXAM 99 times
    8·1 answer
  • Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
    15·1 answer
  • Write the function evens which takes in a queue by reference and changes it to only contain the even elements. That is, if the q
    6·1 answer
  • Describe four features of a well designed input screen
    10·2 answers
  • In cyber security, one of the best ways to protect a computer or network is with a strategy called defense in depth. This strate
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!