1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
9

What is the purpose of TCP?

Computers and Technology
1 answer:
dimaraw [331]3 years ago
4 0

Answer:

The purpose of TCP / IP is to provide computers with a method to transmit data to each other. TCP/ IP provides the means for application to send data between computers and for networks to deliver that data to applications on others computers.

Explanation:

The internet control protocol (TCP/ IP, transmission control IP / internet protocol) is the set of protocols used to transport information on the internet and in most private networks. The TCP/IP name leaves two more important protocols of the transport layers (TCP) and the network layer (IP).

Each internet application depends on the communication of data between two or more processes. The most common is that they are two processes, and that their roles are well defined as client and server. The applications under this model ''client-server'', will issue a service request on the client side, and the server will elaborate a response and return it to the client.

To communicate these two processes it is necessary that the data that configure the requirement made by the client, and those that configure the response, produced by the server, can circulate through the network in both directions. The TCP/IP protocol suite resolves this need. For this, IP performs communication between devices, hosts, or nodes of the network, creating virtual paths between them through its fundamental function, which is routing.

You might be interested in
"The number of hardware chips needed for multiple digit display can be minimized by using the technique called ________"
Dafna1 [17]

Answer: Multiplexing

Explanation:

By using the multiplexing technique we can easily use the multiple digit display in the input pins of the hardware. We can use this technique to display the several digits and the extra hardware is require which is proportional to the number of several digit to be display.

As, hardware use only limited number of input and output pins. Therefore, multiplexing is the technique used the number of hardware chips need for multiple digit display and can be minimize using this technique.

 

4 0
3 years ago
what does it mean when my brainly just tells me theres no answers for any of my questions i have the plus and ive been using it
VashaNatasha [74]
Well it might be a glitch or it didn’t save.
3 0
3 years ago
4) Short answer questions<br>c) What is Cyber Law?​
Kamila [148]

Answer:

Kindly check explanation

Explanation:

Laws refer to legal rules and regulatory framework which is used as a guiding principle to define the actions and behavior which may lead to incurring penalties if boundaries are trespassed.

The word 'Cyber' is popularly used to describe activities, actions and interactions involving the internet. With the burst and continous pace of digital transformation, the internet also called Cyberspace is in a world of its own. Hence, the creation of rules to govern internet interactions.

Cyber laws may thus be explained as codified laws which are designed and implemented to govern all forms of possible online interaction or transactions in other enhance cyber security to protect the interest of persons and data from various forms of internet threats. Cyber laws include ; Data protection laws, Computer crime laws, telecommunication laws and so on.

6 0
3 years ago
Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community c
ivann1987 [24]

Answer:

The appropriate response is "Cloud bursting".

Explanation:

  • A strategy for the implementation of a program in a proprietary cloud or network infrastructure that explodes onto a public cloud if availability or production for computational power increases, could be considered Cloud bursting.
  • It enables extra cloud capabilities throughout cases where additional facilities have been required.
6 0
2 years ago
Compare and contrast between first and second generation of computer<br>​
noname [10]
Frist gen of computers took forever to load and would crash if someone els in the house picked up the phone now adays are computers are in our pockets. There our phones and they rarely if ever crash
8 0
2 years ago
Other questions:
  • HELP AS SOON IS A UNIT TEST WILL GIVE BRAINLIEST
    9·2 answers
  • 5 What is the effect of the author proposing athought experiment at the beginning of the text? ​
    5·2 answers
  • ________ are devices in a computer that are in either the on or off state
    14·1 answer
  • i have a bag of trail mix . one half of the bag is peanuts. 1/4 of the bag is chocolate candies , and 1/4 of the bag is died fru
    15·1 answer
  • Consider the following schema for customer: (id, name, street, city, state, zip, phone), in which customers are uniquely determi
    10·1 answer
  • How should you mark the query if it is a valid one?
    9·1 answer
  • Use the drop-down menus to match each description to the correct term.
    13·2 answers
  • Please help i will give you brainiest and 5 stars answer the question!!!!!!!!!!!!!!!!!!!!!!!!!
    7·1 answer
  • please help no one is helping me on this one
    9·1 answer
  • In 3-5 sentences describe to me in detail how you can make a change and better our online community. What are steps would you ta
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!