1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
3 years ago
15

A Transmission Control Protocol (TCP) connection is established and two devices ensure that they're speaking the same protocol.

What has occured?
Computers and Technology
1 answer:
son4ous [18]3 years ago
6 0

Answer:

The answer is "Three-way handshake".

Explanation:

In this mechanism, two processes associated with communication throughout SEO techniques. In this, the sequence of data packets and recognized by the number of exchanges during the threefold handshake process.

  • This method initiating the process between two apps,  Handshaking begins whenever a computer sends the message to its system.
  • The process of the communication system has been established into the two devices,  which simply send many messages, which allow them to settle the protocol for communication.
You might be interested in
Which of the following is NOT one of the most important elements when designing a website?
Dmitriy789 [7]
Screen resulution Hope this helps
7 0
2 years ago
Read 2 more answers
Which presenter would most likely benefit from a custom slide show?
PIT_PIT [208]
Which presenter would most likely benefit from a custom slide show?

a teacher who teaches four sessions of the same course
3 0
2 years ago
Read 2 more answers
Tonya is working with a team of subject matter experts to diagnose a problem with her system. The experts determine that the pro
Licemer1 [7]

Answer:

The answer of the following question is Encryption.

Explanation:

Encryption is the second layer of the OSI Layer. It helps reduce the maintenance charges and offload complexity.

Encryption has presents in layer 3 and layer 4 which is IPSec in layer 3 and SSL, TSL in layer 4. of OSI Model.

<u>Note</u>- Only the Encryption can protect the data itself

5 0
3 years ago
HELP 99PTS If Answered
Alborosie

You will have to do this as we are not you and we do not know local business/websites. Sorry we could not help.

3 0
3 years ago
Read 2 more answers
Can you help me with Computer issues graphic organizer?<br> Will give out brainly
tino4ka555 [31]
Just put for first: coding, graphics and for second : designing, writing
Third?: put all of the abov
6 0
2 years ago
Other questions:
  • Explain how to use fortran programming in details
    14·1 answer
  • Which of the following is not a commodity?<br>A. Crude oil<br>B. Corn dogs<br>C. Cocoa<br>D. Coffee​
    10·2 answers
  • In which of the following scenarios would you use the Redo function?
    12·1 answer
  • Explain in a few sentences the difference between analytical papers and argumentative papers.
    8·2 answers
  • Which is the hanging indent on the ruler?
    10·2 answers
  • I'm confused. Are , , and elements or nodes? What exactly defines nodes? What defines elements?
    13·1 answer
  • Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
    11·2 answers
  • Describe how both IPv4 and IPv6 access and utilize TCP as an upper-layer transfer protocol.
    6·1 answer
  • You can insert video by clicking video drop-down menu on the ______ tab.
    15·1 answer
  • John has recently retired from an administrative, yet technical job which he held for 40 years. He decided to pursue a life-long
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!