1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
4 years ago
9

What is the purpose of TCP?

Computers and Technology
1 answer:
dimaraw [331]4 years ago
4 0

Answer:

The purpose of TCP / IP is to provide computers with a method to transmit data to each other. TCP/ IP provides the means for application to send data between computers and for networks to deliver that data to applications on others computers.

Explanation:

The internet control protocol (TCP/ IP, transmission control IP / internet protocol) is the set of protocols used to transport information on the internet and in most private networks. The TCP/IP name leaves two more important protocols of the transport layers (TCP) and the network layer (IP).

Each internet application depends on the communication of data between two or more processes. The most common is that they are two processes, and that their roles are well defined as client and server. The applications under this model ''client-server'', will issue a service request on the client side, and the server will elaborate a response and return it to the client.

To communicate these two processes it is necessary that the data that configure the requirement made by the client, and those that configure the response, produced by the server, can circulate through the network in both directions. The TCP/IP protocol suite resolves this need. For this, IP performs communication between devices, hosts, or nodes of the network, creating virtual paths between them through its fundamental function, which is routing.

You might be interested in
Discuss different ways to respond to errors, such as notifying the user onscreen, writing to an error log, notifying the develop
Ronch [10]

Answer:

Notifying the errors is always useful .

Explanation:

The errors should always be notified to the developer. It is useful and is important. When we provide notifications on the screen, it helps the user and it can be used to provide feedback. In regard to developmental work, it has to be important and confidential and we use the help of email to inform or notify errors to the organization. This will help the company from negative criticism and helps the company perform better. We can also write an error log when we face the same error again and again even after notifying the developer organization. This helps to put a reminder to the organization that immediate check has to be dome and eliminate the error from the source.

Some disadvantages are if we do not keep timer implementation, the alert keeps on popping on the screen, which is irritable.

4 0
3 years ago
Question is in photo
Alisiya [41]
Is this java or python pls explain or else i can’t answer
3 0
3 years ago
What is printed by the following program provided all necessary standard header files are included? Explain each line of the out
Ostrovityanka [42]

<u>Output:</u>

f1 in A

f2 in A

f1 in B

f2 in A

f1 in A

f2 in A

f1 in B

f2 in B  

<u>Explanation:</u>

In this snippet, the code makes use of virtual functions. A virtual function is defined as a function that is defined in the base class and redefined in the derived class. If the derived function accesses the virtual function, the program will get executed with the derived class’s version of the function.

In this code, we define the virtual function f1() in class A and also redefine it in class B which is the derived class of A. While executing the program, the function g which takes the object b (class B’s object) as a parameter. It will print class B’s version of f1() rather than class A’s version. This is working off the virtual function.

8 0
3 years ago
Examine the efficiency the various recovery algorithms used in deadlock handling
sineoko [7]

Solution:

The process of transaction can guarantee the reliability of business applications. Locking resources is widely used in distributed transaction management (e.g; two phase commit, 2PC) to keep the system consistent. The locking mechanism, however, potentially results in various deadlocks. In service oriented architecture, the deadlock problem becomes even worse because multiple transactions try to lock shared resources in the unexpectable way due to the more randomicity of transaction requests, which has not been solved by existing research results. In this paper, we investigate how to prevent local deadlocks, caused by the resource competition among multiple sub-transactions of a gl obal transaction, and global deadlocks from the competition among different global transactions. We propose a replication based approach to avoid the local deadlocks, and a timestamp based approach to significantly mitigate the global deadlocks. A general algorithm is designed for both local and global deadlock prevention. The experimental results demonstrate the effectiveness and efficiency of our deadlock prevention approach. Further, it is also proved that our approach provides higher system performance than traditional resource allocation schemes.

This is the required answer.

4 0
4 years ago
What specific type of hardware card inserts into a web server that contains one or more co-processors to handle ssl/tls processi
o-na [289]
A <span>specific type of hardware card which is inserted into a web server that contains one or more co-processors to handle ssl/tls processing is 
</span>SSL/TLS Accelerator.
8 0
4 years ago
Other questions:
  • A.<br> Post-It note<br> b.<br> notebook<br> c.<br> tutor<br> d.<br> spell check
    14·1 answer
  • Under what category of programs and apps do screen savers and backup programs fall?
    10·1 answer
  • The next thing Maria wants to do is to indent the first line of her paragraph how dose she do it
    10·2 answers
  • A device which lets you interact with the computer
    6·2 answers
  • The concept of the internet was developed by the u.s. department of defense as a network that ________ in event of an attack.
    8·1 answer
  • A collection of computers, printers, routers, switches, and other devices
    15·1 answer
  • What does the gym member need to give?​
    8·1 answer
  • Pls help me computer science discoveries
    5·1 answer
  • Corey wrote a code that will display his name every time he presses the down arrow key but there is a bug in it. Display letter
    13·1 answer
  • Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!