1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
4 years ago
15

A Transmission Control Protocol (TCP) connection is established and two devices ensure that they're speaking the same protocol.

What has occured?
Computers and Technology
1 answer:
son4ous [18]4 years ago
6 0

Answer:

The answer is "Three-way handshake".

Explanation:

In this mechanism, two processes associated with communication throughout SEO techniques. In this, the sequence of data packets and recognized by the number of exchanges during the threefold handshake process.

  • This method initiating the process between two apps,  Handshaking begins whenever a computer sends the message to its system.
  • The process of the communication system has been established into the two devices,  which simply send many messages, which allow them to settle the protocol for communication.
You might be interested in
What is a zener diode
V125BC [204]

a form of semiconductor diode in which at a critical reverse voltage a large reverse current can flow.
8 0
3 years ago
Even though the Pizza Hut corporation understood the need to make use of the Web, the franchise owners were skeptical. From an I
Gelneren [198K]

Answer:

Franchise owners are essential stakeholder group whose opinions are directly related to the company's success.

Explanation:

Franchise owners are essential stakeholder groups. A stakeholder is a person, organization, social group. A stakeholder can be internal or external to the business. Stakeholders affected by business and affect the business.

Different type of stakeholder is

  • Customer
  • Employees
  • Investors
  • Suppliers
  • Owners

Pizza Hut corporation owner is a stakeholder whose opinions are related to the company's success.

8 0
4 years ago
What is a what if analysis in Excel example?
Sergio039 [100]

Answer:

What-If Analysis in Excel allows you to try out different values (scenarios) for formulas. The following example helps you master what-if analysis quickly and easily.

Assume you own a book store and have 100 books in storage. You sell a certain % for the highest price of $50 and a certain % for the lower price of $20.

(i really hope this is what u needed)

4 0
3 years ago
Union Carbide accident safety policies and procedures were not followed was due to
DedPeter [7]

Answer:

Defects in design, maintenance letdowns, lack of training, economy dealings, and blunders in operations.  

Explanation:

The design definitely was not appropriate, and there was lack in maintenance. Also there was lack of training, and blunders in operations. The project was not sound economically as well. And, you should know that problem arose due to water leakage. And that was due to mainly maintenance failure, which you can study in deep through Material Science. Lack of design is part of industrial design and others are part of management.

3 0
3 years ago
Greg is the purchasing manager at a jeans-manufacturing company. He knows he could save his company money by using cheaper, thin
pychu [463]

Answer:

Option (B) i.e., character is the correct answer to the following question.

Explanation:

Because the character quality demonstrates the ability of honesty, loyalty, and integrity, etc that shows the positive character of the person and Greg has good character quality because he thinks about their customers before he thinks about the money. So, that's why Greg shows the quality of the good character and he also loyal about their work.

8 0
3 years ago
Other questions:
  • QUESTION : John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows hi
    15·1 answer
  • All of the following statements correctly describe an advantage or disadvantage associated with the use of Monte Carlo Analysis
    9·1 answer
  • One out of how many people in the world has a Fac3book account?
    8·1 answer
  • When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
    11·1 answer
  • Define a class named ComparableSquare that extends Square (defined above) and implements Comparable. Implement the compareTo met
    7·1 answer
  • Describe at least three virus scanning techniques
    13·1 answer
  • Elliott is trying to normalize a database that he has designed. Which is not one of the elements of 1NF or 2NF?
    15·1 answer
  • Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to ta
    5·1 answer
  • I am having trouble with this python question. I am in a beginner level class also so any solution that isn't too complex would
    8·1 answer
  • Utility software is used to maintain a computer.(yes or no)​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!