1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
4 years ago
6

What is transmission control protocol?

Computers and Technology
1 answer:
Valentin [98]4 years ago
4 0

Answer:

the rule that defines how packets of data are transmitted between computers and networks

Explanation:

Transmission control protocol is full form of TCP and Internet protocol  are used in combination to transmit the data and packets between network and computer. These protocols are used to communicate different devices that are interconnect on the network via internet.

You might be interested in
Which is an example of a variable name written in camelcase?
stiv31 [10]

Answer: songName

-DoggyMan5

4 0
3 years ago
Read 2 more answers
Your computer is crashing on a regular basis. Which of the following is an operation available to the user that should help rese
Neko [114]

Answer

System restore

Explanation

System restore is a recovery feature that helps restore your system to the previous condition or point. Most computers have system restore disks which are an advantage to the users especially when the computer clashes.These disks are very effective when it comes to restoring the system to its initial state.

6 0
3 years ago
Read 2 more answers
Why do users attach speaker to computer?
Reika [66]

Answer:

To hear the audio.

Explanation:

Why is everyone asking this question. To hear the audio, to get better audio quality, and/or to get louder audio.

4 0
3 years ago
The __________ is the encryption algorithm run in reverse.
Mkey [24]
Decryption algorithm
7 0
3 years ago
Adnan adds the word "shapes” to the shape.
Tamiku [17]

Answer:

its B: select, then right-click

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • ___________ is an unsecured client server application / protocol that transfers files between two computers.
    11·1 answer
  • Which of the following is not a job title associated with a career in visual and audio technology? master control operator produ
    9·1 answer
  • A Uniform Resource Locator (URL) consists of three separate parts: network protocol, host, and web browser.
    11·2 answers
  • Cell references in a formula are called _____.<br> a. assumptionsc. numbersb. valuesd. content
    11·1 answer
  • When should you save your document?
    15·2 answers
  • Cash cows are always in
    7·1 answer
  • Which of these devices collects the most information on network activity?
    11·1 answer
  • What is the difference between special purpose software and customized software​
    8·2 answers
  • There are 10 girls and 8 boys at a party. A cartoonist want to sketch a picture of each boy with each girl. How many sketches ar
    12·1 answer
  • Why aren't my skullcandy bluetooth headphones connecting to my school chromebook if I turned on both the headphones and the blue
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!