1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
2 years ago
13

Which best describes transmission control protocol's (tcp) use of the window header field?

Computers and Technology
1 answer:
jonny [76]2 years ago
7 0

It is bidirectional, so both ends can control data flow. The local transmission control protocol (TCP) process sends four segments, each 4 bytes long.

<h3>What is Transmission control protocol ?</h3>

One of the key protocols in the Internet protocol family is the Transmission Control Protocol. It was first used to supplement the Internet Protocol in the first network installation. TCP/IP is the name given to the full suite as a result.

  • TCP, which is used to transmit data from the sender to the receiver, is a transport layer protocol. Due to its adherence to the flow and error control mechanisms, TCP is a trustworthy protocol. Additionally, it supports the acknowledgment system, which verifies the data's status and audible arrival.

Learn more about Transmission control protocol here:

brainly.com/question/14280351

#SPJ4

You might be interested in
Write a program that implement a bubble sort ?
Tanzania [10]

Answer:

 A program that implement a bubble sort:

 #include<iostream.h>

 #include<conio.h>

 

int main()

{

int ar[50],no,i,j,temp;

cout<<"Enter array size ";

cin>>no;

cout<<"Enter array elements ";  

 

for(i=0;i<no;++i)

 cin>>ar[i];

 

for(i=1;i<no;++i)

{

 for(j=0;j<(no-i);++j)

  if(ar[j]>ar[j+1])

  {

   temp=ar[j];

   ar[j]=ar[j+1];

   ar[j+1]=temp;

  }

}

 

cout<<"Bubble Sort array";

for(i=0;i<no;++i)

 cout<<" "<<ar[i];

 

return 0;

}

6 0
3 years ago
Careers in information technology deal with
podryga [215]

Answer:

A

Explanation:

A would be the best possible answer

3 0
3 years ago
Read 2 more answers
Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
Naddika [18.5K]
Efficiency because if you don't have very good efficiency then somebody can't really read it so they won't know what it's saying.
5 0
4 years ago
Write an overloaded constructor for the Table class that will take a single argument for the color of the table Write a set meth
creativ13 [48]

Explanation:

Below is required code in java :-

public class Table{

   private String color;    //attribute to store the color of the table

   public Table(){    //default constructor

       this.color="";   //set a default blank color

   }

   public Table(String color){    //overloaded constructor

       this.color=color;    //set the color value equal to the parameter provided

   }

   public void setColor(String color){    //setter or mutator method

       this.color=color;    //set the color value equal to the parameter provided

   }

}

8 0
4 years ago
Quiz
Dmitrij [34]

Answer: False

Explanation: It is sent to committee then senate.

4 0
3 years ago
Other questions:
  • The most significant factor in choosing a transmission method is its ____.
    10·1 answer
  • 22 If you are involved in a violation and you do not have insurance to comply with the __________________, your driver license a
    9·2 answers
  • There are several different formats for storing images. They are prints, slides, negatives, and digital. Which is the best forma
    8·1 answer
  • What coding language should i begin with if i'm looking to get into AI ?
    11·1 answer
  • What type of things can be marketed
    11·1 answer
  • Providing incentives for customers to learn more about your service is known as?
    7·1 answer
  • Write the following program: Use struct data type to store information about courses. Every course is characterized by the follo
    6·1 answer
  • You’ve been tossed into an insane asylum. What do you tell the people there to prove to them that you don’t belong inside?
    7·2 answers
  • PLEASE ANSWER! I NEED IN 30 MIN.
    10·1 answer
  • ________ involves disconnecting individual users from their selected internet service providers and redirecting them to illegiti
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!