1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
9

What is the purpose of TCP?

Computers and Technology
1 answer:
dimaraw [331]3 years ago
4 0

Answer:

The purpose of TCP / IP is to provide computers with a method to transmit data to each other. TCP/ IP provides the means for application to send data between computers and for networks to deliver that data to applications on others computers.

Explanation:

The internet control protocol (TCP/ IP, transmission control IP / internet protocol) is the set of protocols used to transport information on the internet and in most private networks. The TCP/IP name leaves two more important protocols of the transport layers (TCP) and the network layer (IP).

Each internet application depends on the communication of data between two or more processes. The most common is that they are two processes, and that their roles are well defined as client and server. The applications under this model ''client-server'', will issue a service request on the client side, and the server will elaborate a response and return it to the client.

To communicate these two processes it is necessary that the data that configure the requirement made by the client, and those that configure the response, produced by the server, can circulate through the network in both directions. The TCP/IP protocol suite resolves this need. For this, IP performs communication between devices, hosts, or nodes of the network, creating virtual paths between them through its fundamental function, which is routing.

You might be interested in
When creating a firewall exception, what is the difference between opening a port and allowing an application through?
Mnenie [13.5K]
Every application has access to specific opened port. If you only make a exception for the specific application only that application can bypass the firewall.
6 0
3 years ago
Which environment variable affects the number of past commands used in the current shell session?
scoray [572]
HISTSIZE is the environment variable affects the number of past commands used in the current shell session.
4 0
4 years ago
The list of abbreviations, punctuation, symbols, typefaces, and instructional notes that appears at the beginning of the ICD and
Ilia_Sergeevich [38]

Answer: Conventions

Explanation: Convention is the writing activity with the components like punctuation,grammar,symbols,note etc to make the written content understandable and clear. This feature is used because people can understand the meaning of content read by them without initializing it later.

As soon as the reader finishing the reading the information should be clear in his/her mind so that they don't have to figure it out after reading.Convention enhances the value of reading and learning by it's feature .

4 0
3 years ago
What is the biggest danger when you reveal information such as your Social Security number?
Dima020 [189]

based off my knowledge im gonna to go with OPTION A because ur social security number holds information like your brith etc

6 0
3 years ago
Read 2 more answers
Is science fiction always set in the future
Natali5045456 [20]
Yes and No it all depends on how the author wants the poem how to be and become. Majority of the time science fiction is set for the future.
5 0
3 years ago
Other questions:
  • After a normal system shutdown, when the computer is turned off, contents of the memory used to store bios settings are
    12·2 answers
  • What is a central location that houses Joint Information System (JIS) operations and where public information staff perform publ
    6·1 answer
  • A website's ____ page provides basic information about the individual or organization and includes a navigation bar with links t
    13·1 answer
  • Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
    14·1 answer
  • Ok so I usually don’t do this but I just need an answer , on Instagram a notification popped up while I was watching someone’s s
    9·2 answers
  • Write a function process_spec that takes a dictionary (cmap), a list (spec) and a Boolean variable (Button A) as arguments and r
    10·1 answer
  • A keyboard would be considered _____. Select 2 options.
    13·2 answers
  • Sarah used a grid to create this layout for a website. Which rule of composition did Sarah use for the grid?
    7·2 answers
  • Life without internet points
    7·2 answers
  • Edge is a video game featuring interactive extreme sports. The graphics used in the game are protected by
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!