1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inn [45]
3 years ago
14

Which protocol, as a companion protocol to RTP, provides monitoring and reporting for RTP connections?

Computers and Technology
1 answer:
MrRa [10]3 years ago
4 0
<span>The answer is Real Time Control Protocol (RTCP).   A companion to RTP, the RTCP provides monitoring and reporting for RTP connections.  It resembles the RTP but there are more alternate structures that depend upon the type of the RTCP packet.</span>
You might be interested in
HELP PLX ITS PYTHON BTW!!!
ExtremeBDS [4]

Answer:

Sebastian is your last name diaz

Explanation:

Functions allow us to break our program into multiple parts

Multiple is the answer

Atlanta-Robinson

5 0
3 years ago
Which type of service offers a preconfigured testing environment for application developers to create new software applications
gtnhenbr [62]

The type of service offers a preconfigured testing environment for application developers to create new software applications is Software as a Service (SaaS).

<h3>What is software as a service SaaS?</h3>

Software as a service (SaaS) is known to be a type of service that gives its users the ability to be able to link to and also use cloud-based apps in course of the Internet.

Conclusively, The type of service offers a preconfigured testing environment for application developers to create new software applications is Software as a Service (SaaS) as it gives its best service.

Learn more about application developers  from

brainly.com/question/11352260

#SPJ1

5 0
2 years ago
Complete the statement by entering the appropriate term in the space below.
Vera_Pavlovna [14]

Answer:

Probably "compress", but these days the common answer is "upload to cloud".

Explanation:

Compressing the files is an easy way to reduce their size, unless most of the size is in already compressed, high-entropy formats (like mp3, jpeg or mp4).

The common compression format is .ZIP - you've probably seen it countless times, but other ways like RAR, 7Z are also popular, while Linux users mostly deal with tar.gz, tar.bz2 or tar.xz

On the other hand, the standard practice these days is to upload the presentation to a cloud service, like GSheets or Office PowerPoint 365, which gets rid of the limits of email filesize, while providing a convenient web-app way to view the presentation without downloading (and it doesn't clutter their inbox space or hard drives)! Alternatively, one other way to email any large file (not just a presentation) includes uploading it to some service like DropBox, GDrive or anything similar.

7 0
2 years ago
Read 2 more answers
Create a list words = ['is', 'NLP', 'fun', '?']. Use a series of assignment statements (e.g. words[1] = words[2]) and a temporar
Svetlanka [38]

Answer:

words = ['is', 'NLP', 'fun', '?']

tmp = words[1]

words[1] = words[0]

words[0] = tmp

words[3] = '!'

print(words)

Explanation:

- Create the list

- Assign the new values using <em>tmp</em> variable

- Print the result

Since tuples in Python are unchangeable, you cannot transform the list using tuple assignment.

5 0
3 years ago
The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely
tatuchka [14]

Answer: Operational Manager

3 0
3 years ago
Read 2 more answers
Other questions:
  • You must receive an invitation in order to join Pinterest. True or False?
    9·2 answers
  • Select the proper ergonomic keyboarding techniques.
    15·2 answers
  • Discussion group may have a___________ who monitors the postings and enforces the sides rules​
    13·1 answer
  • In a video, a motionless image is called
    7·2 answers
  • How do keystroke dynamics determine whether to authenticate an individual or not?
    14·1 answer
  • Between Handshake protocol, change cipher suite, alert and appplication data protocols, the first one to use is:
    13·1 answer
  • State why hexadecimal is used to display the error code
    11·1 answer
  • 1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch
    5·1 answer
  • Explain any 10uses of computer that are specific to your field of study giving appropriate examples​
    13·1 answer
  • Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!