1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
3 years ago
5

Which protocols are TCP/IP application layer protocols? (choose all that apply)

Computers and Technology
2 answers:
natita [175]3 years ago
5 0

Answer:

Option(b) and Option(c) is the correct answer for the given question.

Explanation:

TCP stands for transmission control protocol, In the TCP protocol firstly it maintains the connection between the sender and the receiver. The receiver always gives an acknowledgment to the sender when it receives the information that's why TCP is reliable protocol it is found in TCP/IP application layer protocols    

UDP stands for user datagram protocol, In the UDP protocol, it does not maintain the connection between the sender and the receiver. The receiver does not give any acknowledgment to the sender that why UDP is not a reliable protocol . it is also found in the TCP/IP application layer protocols

  • In the option(a) IP is found in the network layer that why this option is incorrect.
  • In the option(d) FTP is found in the application layer thats why this option is incorrect .

Hence TCP and UDP are TCP/IP application layer protocols

Arisa [49]3 years ago
5 0

FTP telnet most widely implement of TCP/IP application layer you will work with many others as both a user and a system administrator. Some other commonly used TCP/IP applications are: Domain Name Service (DNS).

Explanation:

You might be interested in
Explain: The decode part of fetch decode execute cycle
egoroff_w [7]

Answer:

Image below

Explanation:

5 0
3 years ago
Read 2 more answers
Transitive spread refers to the effect of the original things transmitted to the associate things through the material, energy o
Ludmilka [50]
A is the correct answer
4 0
3 years ago
Kurtz & Kemeny created an easy-to-learn programming language called?
vampirchik [111]

BASIC

(Beginners' All-purpose Symbolic Instruction Code)

4 0
3 years ago
What is the program filename and extension of file explorer?
Klio2033 [76]

Explorer.exe is the program filename and extension of File Explorer.

To add, File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the filesystems.

4 0
3 years ago
Words or symbols that help you narrow down your search are called:
timurjin [86]

Answer:

c) search operators

Explanation:

Words or symbols that help you narrow down your search are called search operators. This ultimately implies that, search operators are commands and special characters (words or symbols) which help users to filter and refine their search engine results by making the search more precise and specific in nature. Thus, search operators only provide search engine results that are relevant to what a user is searching for or it narrow down the focus of a search.

Hence, search operators comprises of commands and special characters (words or symbols) such as AND, OR, NOT, "", -, +, *, .., :, etc used for narrowing down search engine results.

For instance, typing "file.mp3" in a search engine would only present results that are in mp3 formats.

7 0
3 years ago
Other questions:
  • Select the correct answer.
    8·1 answer
  • Enter a nested lookup function in cell E4 that uses the cells E2 and E3 to return a specific sales record. For example, using th
    14·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • What is the Documenter?
    10·1 answer
  • Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whene
    9·1 answer
  • Not all hardware is connected with wires, some hardware might be connected wirelessly with
    9·1 answer
  • MAN speeds are faster than WAN speeds because of ________. technological limitations regulatory limitations
    6·1 answer
  • Match the image to the view type in a presentation program. scroll bar tool bar status bar menu bar provides an array of buttons
    10·2 answers
  • have a folder on your Windows computer that you would like to share with members of your development team. Users should be able
    9·1 answer
  • What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!