1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
15

A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS

Computers and Technology
1 answer:
Greeley [361]3 years ago
4 0

Answer:

FIN

Explanation:

A TCP is an acronym for Transmission Control Protocol and it is one of the essential and important protocol of the internet protocol network. This simply means that, it is an essential part of the TCP/IP network.

The TCP has a wide range of applications in the following areas, file transfers, world wide web, remote administration, e-mail, etc.

The TCP connection are mainly established in the network using the three-way handshake.

A TCP FIN segment is a request to the other transport process to close a connection. The FIN in transmission control protocol (TCP) is an acronym for finish and it involves the packets associated with termination or closing of a network connection.

Generally, the TCP in networking is made up of all of the following flag bits, namely;

1. SYN: used for synchronizing packets associated with a connection.

2. ACK: this is mainly where an acknowledgement of packets in a network takes place.

3. FIN:  it is used for closing connections.

4. PSH: used for pushing packets that are to meant to be delivered at the far end.

5. RST: used as a reset in times of errors in the connection.

6. URG: used to denote urgent and high priority packets in the network.

7

You might be interested in
What are two fundamental components of data structures?
Fed [463]
Organization and access method.

Hope this helped! :)

- Jujufire
8 0
3 years ago
Arrange the Jumbled letters 1.eilf ngrihsa ________________ 2.cersityu ourreecs ________________ 3. ngrihsa ________________ 4.
Alisiya [41]

Answer:

1. file sharing

2. security recourse

3.sharing

4.communication

5.flexible access

Explanation:

-

5 0
3 years ago
Top 5 best comedy or action movies.
Cloud [144]
Comedy movies you should watch is
grown ups
spider man into the spider verse
action movies you can do
like a fast and furious movie ?
some cool scary movies are
the strangers
insidious
and the serbian film :)
7 0
3 years ago
Read 2 more answers
What do students buy when they pay tuition?
Marizza181 [45]

Answer:

the right to attend classes at a school

Explanation:

This question seeks to address why we go to school. We go to school to study and get certificates of qualification. To study, we have to pay tuition fees. Tuition fees constituent fifty percent of a school’s income, and without it, you will not be able to get into a classroom in the first place. It covers almost 70% of what the student does in school and this to study in a class. It pays for all academics and research, the library, teaching support, and many more. A place to live at a school and transportation expenses are probably not included in tuition fees. These are other expenses that a student requires to survive.

4 0
3 years ago
Read 2 more answers
Each symbol of an octal number corresponds to 3 bits of a binary number. is it true or false​
grin007 [14]

Answer: True.

Explanation: It uses only the 3 bits to represent any digit in binary and easy to convert from octal to binary and then to vice-versa. Hope that helps

5 0
3 years ago
Other questions:
  • You should use _____ software for writing a letter.
    10·1 answer
  • ICT excel data homework
    10·1 answer
  • "You are setting up a new subnetwork on an existing network. Management has asked that you use existing cabling that the company
    14·1 answer
  • A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250
    7·1 answer
  • Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the peop
    5·1 answer
  • How to identify mistakes in a html code??​
    14·1 answer
  • what could a company do if it was using a commercial wan and a vulnerability appered thst allowed attackers
    11·1 answer
  • NEED HELP ASAP!!!!!!
    7·2 answers
  • Is majority intent determined by how many times the same type of result is shown on the search engine result page?
    6·1 answer
  • A Python file that contains variables and functions and can be used in other programs is called a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!