1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga2289 [7]
3 years ago
11

Do applications need to exchange udp control messages before exchanging data

Computers and Technology
1 answer:
Molodets [167]3 years ago
7 0

The answer is NO.

Thats what makes UDP connectionless. Aclient that is going to send a UDP message to the server just sends it.The server does not know it is coming untill it arrives .When a server recieves a UDP message it gets the source address/port and the data.

You might be interested in
Fred has to write a report on the general opinion of the influence of television on political decision-making. What internet res
Amiraneli [1.4K]
B. forum
they hold the most accurate information and people respond the most
3 0
3 years ago
Read 2 more answers
What are the technical details about each hardware component called?
RideAnS [48]
Specifications are the technical details about each hardware component
8 0
3 years ago
The Twitter website has become a de facto first source for many important events in the last decade. Twitter's hashtag feature l
timurjin [86]

Answer:

..........................................?

7 0
3 years ago
Read 2 more answers
Ron was asked to maintain a database to record the height of every student in class.
Fiesta28 [93]

B. =Compare(B3;B4)

hope I helped!!!

4 0
3 years ago
Read 2 more answers
George has to present the goals of information management to his team member. What is a goal of information management? The goal
Law Incorporation [45]

Answer:

The purpose of information management is to: design, develop, manage, and use information with insight and innovation. support decision making and create value for individuals, organizations, communities, and societies.

Explanation:

5 0
3 years ago
Other questions:
  • Which behaviors demonstrate good netiquette? Check all that apply.
    14·1 answer
  • An online game is played with two dice, explain why decomposition will be used in creating the algorithm for the game?
    9·2 answers
  • All digital images are made up from varying rectangles of color, called _____________.
    6·2 answers
  • Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 3, print "To
    9·1 answer
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB seri
    5·1 answer
  • Implement a sublinear running time complexity recursive function in Java public static long exponentiation (long x, int n) to ca
    11·1 answer
  • You are now going to prepare some reports for the company. Measurements are in metres and volume
    7·1 answer
  • Messages that have been accessed or viewed in the Reading pane are automatically marked in Outlook and the message subject is no
    10·2 answers
  • Energy/power management systems, kitchen appliances, smart televisions, baby monitors, fitness trackers, and personal health mon
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!