1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
2 years ago
5

Which protocols are TCP/IP application layer protocols? (choose all that apply)

Computers and Technology
2 answers:
natita [175]2 years ago
5 0

Answer:

Option(b) and Option(c) is the correct answer for the given question.

Explanation:

TCP stands for transmission control protocol, In the TCP protocol firstly it maintains the connection between the sender and the receiver. The receiver always gives an acknowledgment to the sender when it receives the information that's why TCP is reliable protocol it is found in TCP/IP application layer protocols    

UDP stands for user datagram protocol, In the UDP protocol, it does not maintain the connection between the sender and the receiver. The receiver does not give any acknowledgment to the sender that why UDP is not a reliable protocol . it is also found in the TCP/IP application layer protocols

  • In the option(a) IP is found in the network layer that why this option is incorrect.
  • In the option(d) FTP is found in the application layer thats why this option is incorrect .

Hence TCP and UDP are TCP/IP application layer protocols

Arisa [49]2 years ago
5 0

FTP telnet most widely implement of TCP/IP application layer you will work with many others as both a user and a system administrator. Some other commonly used TCP/IP applications are: Domain Name Service (DNS).

Explanation:

You might be interested in
¿Qué es lo contrario a frágil?
Pepsi [2]

Answer:

frágil

Explanation:

7 0
3 years ago
The horizontal bar at the top of a web page that typically holds a page title or course information is called a?
dem82 [27]

Answer B) Headers

Explanation:

I just took a Tech class, im pretty sure its headers. Hope this helps! -3-

3 0
3 years ago
bilmain manufactures has recruited you as a network administrator to handle the organization's network operations. you want to s
Art [367]

Since Bilmain manufactures has recruited you as a network administrator to handle the organization's network operations, the subnet mask for this class A address is 255.0.0.0.

<h3>Why is a subnet mask of 255 usually used?</h3>

The 255 address, or host address of all ones in binary notation, is used to send a message to every host on a network. It's important to keep in mind that no host can be given the first or final address in a network or subnet. You ought to be able to assign IP addresses to 254 hosts at this point.

A subnet mask is a 32-bit integer that is produced by setting all host bits to 0 and all network bits to 1. The subnet mask does this by dividing the IP address into network and host addresses. The "0" address is always a network address, but the "255" address is always allocated to a broadcast address.

Hence, The subnet mask for a class C network would be 255.255.255.0, which indicates that 24 bits are being used for the network. This is shown in CIDR notation by adding a /24 after the IP address.

Learn more about subnet mask from

brainly.com/question/28256854
#SPJ1

5 0
1 year ago
Any radio hardware containing a transmitter and a receiver that is located in a fixed location is called a _______
arsen [322]

Answer:

base station

Explanation:

According to my research on information technology, I can say that based on the information provided within the question this type of radio hardware is referred to as a base station. These are tied to a fixed location and used to communicate as part of either: a push-to-talk two-way radio system, or a wireless telephone system such as cellular CDMA or GSM.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
? Assessment
Ghella [55]

Answer: Game designer, sound engineer, software engineer, writer, quality assurance tester

8 0
2 years ago
Other questions:
  • Brittany just pulled up a database table with employee information that contains 50 records of employees at her company. Which o
    12·1 answer
  • The method header of the equals() method within the string class is ____.
    13·1 answer
  • Which of the following is applicable during a hostile act:
    15·1 answer
  • Why is it important for people to express resentments in the workplace?
    9·1 answer
  • HELP ASAP
    10·2 answers
  • Which speaker port should you use when connecting a single speaker to a pc?
    6·1 answer
  • An interface does not have ____.
    13·1 answer
  • How are Earth's plates made?
    14·1 answer
  • Write a C++ function for the following:
    14·1 answer
  • Which is NOT a valid compute shape option within the Oracle Cloud Infrastructure (OCI) compute service
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!