1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
4 years ago
6

What is transmission control protocol?

Computers and Technology
1 answer:
Valentin [98]4 years ago
4 0

Answer:

the rule that defines how packets of data are transmitted between computers and networks

Explanation:

Transmission control protocol is full form of TCP and Internet protocol  are used in combination to transmit the data and packets between network and computer. These protocols are used to communicate different devices that are interconnect on the network via internet.

You might be interested in
Pls awnser if awnser is wrong I will unmark brainliest
choli [55]

Answer: i think 1, 3, and 4

Explanation:

3 0
3 years ago
Howie is a business analyst who is given access to the database of a product prior to its launch. He needs to understand the dat
Kisachek [45]

Answer:

D) use SQL or graphical tools to query the database            

Explanation:

To query the database using SQL or graphical tools will help Howie to retrieve bulk of records from the database according to his requirements and it will help to understand and work with the data in a better way than using the data in raw form.

SQL is a language of database used to manipulate and manage the data in the relational database and to query the database.

It is an easy and faster way to query using SQL or graphical tools because no coding is required here.

Different graphical tools are used to present the data in the database in a way that can be easily understood by a person. Different interfaces are provided to visualize the database tables or schema diagrammatically e.g in the form of graphs etc. Different views of the database can be provided to different users according to their requirement and what information they required to be presented.

6 0
3 years ago
In a game with three frames, where will the objects on Layer 1 appear?
Ivan
It’s between d or c
6 0
3 years ago
Read 2 more answers
Please create a brute force password cracker using python
serg [7]

Answer:

0

2

I need to make small programs for school to brute force crack different types of passwords; I'm looking to create a brute force python code that will run through every possible combination of alphabetical and alphanumerical passwords and give me the password and the amount of time it took to crack.

I did the same with purely numerical passwords and got this:

import datetime as dt

Password4 = 123456

def crack_password():

   start = dt.datetime.now()

   for n in range(1000000):

       password_guess = '{0:04d}'.format(n)

            if password_guess == str(Password4):

               end = dt.datetime.now()

               print("Password found: {} in {}".format(password_guess, end - start))

              break

   guesses = crack_password()

I then tried to do something somewhat similar for alphabet/alphanumerical passwords but did not work whatever I tried:

   import random

   letters = [str(i) for i in range('a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p')]

   s = [''.join([a,b,c,d,e,f,g,h]) for a in letters for b in letters for c   in letters for d in letters for e in letters for f in letters for g in letters  for h in letters]

   random.shuffle(s)

   real_password = 'aaaaaaaa'

   i = 0

Explanation:

8 0
3 years ago
A.m. client appears at the top of every page
LuckyWell [14K]

Answer:

what do you mean by this

clarify it

7 0
2 years ago
Other questions:
  • What are pixels that are the exact same between multiple frames called?
    15·1 answer
  • What is the difference between First Person Shooters and Construction Simulations?
    12·2 answers
  • Creating calendar events prevents individuals from being able to schedule a time to collaborate.
    11·1 answer
  • Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-fac
    8·1 answer
  • What can u access various sites on
    12·1 answer
  • What is 8 hours, 5 minutes, 22 seconds minus (-) 7 hours, 24 minutes, 37 seconds?
    6·1 answer
  • Explain how software is distinct from hardware.
    8·2 answers
  • When adding cells you must use a "+" symbol, you cannot use a ":" symbol.<br><br> ☐ True<br> ☐ False
    13·1 answer
  • All of these valid ways to earn money in microworkers except
    8·1 answer
  • Two girls were born to the same mother, on the same day, at the same time, in the same month and the same year and yet they're n
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!