1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
10

TCP is a Transport-layer protocol used to communicate between applications, but it's a lightweight Transport-layer protocol, mea

ning it lacks many of the reliability and flow control features of UDP._______. A. True.B. False.
Computers and Technology
1 answer:
denis-greek [22]3 years ago
3 0

Answer:

The answer to the given question is the option "B".

Explanation:

In this question, the answer is false because the UDP is not reliable for the data flow control.  In the transport layer protocol it two protocols to serving the transportation layer that is TCP and UDP.  

  • In the network layer, IP protocol sends a datagram to the destination host from a source host. When a host sends a message to another host, the origin process sends a request to a process of destination.              
  • The Transport layer protocol is a part of the UDP and is not reliable.  

That's why the answer to this question is "false".

You might be interested in
How will I go about conducting the investigation on fake news
Leno4ka [110]

Answer:

You can begin your report, and write about CNN, BBC, or any other liberal news network.

Explanation:

5 0
3 years ago
You develop an app, and you don't want anyone to resell it or modify it. This is an example of: A an operating system. B open so
Mars2501 [29]
The answer is C. Proprietary software is when the publisher reserves rights from licensees to modify or share the software.
5 0
3 years ago
Read 2 more answers
I am trying to code a lifting simulator game on ro-blox. These problems listed in the third picture tells you the problems. If y
ipn [44]

Answer:

cool

Explanation:

3 0
3 years ago
Read 2 more answers
Fire stick optimizing system storage and applications
vivado [14]

Answer:

IN MY PROFILE

Explanation:

I HAVE AWNSERED THIS QUESTION THROUGHOUT MY BEING HERE PLEASE DO NOT BE AFRAID TO CLICK ON MY PROFILE AND FIND THE ANSWER

5 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Other questions:
  • If you're sending an email from your laptop to a classmate the laptop is the
    11·1 answer
  • Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
    10·1 answer
  • In a Java Script language. create a two-dimension array consisting of numbers representing costs. After creating the array, prin
    11·1 answer
  • Consider the following statement from the CS Principles course framework: The global distribution of computing resources raises
    12·1 answer
  • Given an array a, write an expression that refers to the first element of the array .
    5·1 answer
  • How to write cube of a number from flowchart ​
    5·1 answer
  • Decimal numbers are based on __________.
    6·1 answer
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
  • What is the most common knowledge computer programmers need in order
    15·2 answers
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!