1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
4 years ago
15

Which is true about TCP and UDP? Choose two answers.

Computers and Technology
1 answer:
vichka [17]4 years ago
7 0

Answer:

TCP is a connection-oriented protocol

UDP does not acknowledge a receipt of data

Explanation:

TCP (Transmission Control Protocol) is a protocol to transfer data, this is one of the most important protocols on the entire internet, this method was implemented from the beginning of the network.

UDP (User Datagram Protocol) this is a protocol faster than TCP because this method doesn't establish a connection to sent data, in this case, always sent data, but TCP is more secure than UDP, and for that UDP is used to transfer music or videos, and TCP websites and database.

UDP doesn't need acknowledgment is done by UDP, is only concerned with speed.

You might be interested in
Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor gramma
Arlecino [84]

This type of attack is called as phishing emails.

<u>Explanation:</u>

Normally any bank will not ask end user about login details such user id, password, pin number in email. So bob as think and before responding the mail. Moreover this type email to be considered as hacker email, who want to access the bob accounts and do access his account and steal money from bob accounts.

Luckily bob contacted bank to stop further hackers not to his accounts. Since it is grammar mistake bob understood it is hackers who asking bob user id and password.

Bob has prompted these type of mails are called phishing emails. Better to avoid it.

6 0
3 years ago
What are the programs required to work in computer
BARSIC [14]

Answer:

Specific requirements vary by employer, but completing a degree program or a coding academy is generally necessary to begin a career as a computer programmer.

Explanation:

please mark me as brainliest

8 0
3 years ago
¿como influye la tecnologia en su vida cotidiana?
ANEK [815]

Answer:

La tecnología afecta la forma en que hablamos, aprendemos y pensamos. También nos hemos vuelto dependientes de la tecnología.

Explanation:

3 0
3 years ago
HELP PLEASE
GREYUIT [131]

Answer:

D, storyboard

Explanation:

5 0
3 years ago
The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one. Why is it so?
stellarik [79]

Answer:

Yes, The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one.But the addressale fire alram system is more reliable than a conventional system.

Explanation:

Conventional systems are hardware-based and use analog technology. where addressable fire alarm use digital technology. addressable system is generally more reliable than a conventional system mainly due to how the different systems are wired. With a conventional system, if a device’s wire is damaged or severed, its signal and the signal of other devices down the line cannot be transmitted to the control panel.

With an addressable system, both ends of the wire connect to the control panel. Therefore, if one end becomes damaged or severed, signals can still reach the control panel through the other end of the loop. In addressable systems, a device can be removed or disabled and it will not affect the other devices in the loop.

7 0
3 years ago
Other questions:
  • You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
    9·1 answer
  • You are a high school counselor with 9 students who applied for 3 different summer jobs: Job A, Job B, and Job C. Each of the su
    5·1 answer
  • A database record can best be described as:
    11·1 answer
  • 1.6.M - Assignment: Understanding If Else Statements in Python
    7·1 answer
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • What is the correct syntax to take the first five characters from the cell A2 and place it to its right in cell A3? =RIGHT(A3,5)
    5·2 answers
  • A presentation is widely used to present ______ and ______ effectively​
    12·1 answer
  • 1. You are designing a program that will keep track of the boxes in a doctor’s office. Each box will have three attributes: date
    10·1 answer
  • Make a program that receives several integers (the program ends when a negative number is entered) and shows how many times the
    14·1 answer
  • Can someone help me explain Nvm scheduling in operating systems?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!