1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Damm [24]
3 years ago
15

What does ‘‘negotiation’’ mean when discussing network protocols? give an example?

Computers and Technology
1 answer:
rewona [7]3 years ago
4 0
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

You might be interested in
When using an online media source, students should ensure the information is
OLEGan [10]
Viable and true. hope this helps!
6 0
4 years ago
Read 2 more answers
What are placeholders in Java?
Goryan [66]
C variables are placeholders in Java
5 0
3 years ago
Do debit cards allow you to draw funds directly from your checking accounts
LekaFEV [45]
Some of them do let you draw funds but not all debit cards
4 0
3 years ago
A two part circular linked chain implementation of a queue
dem82 [27]

Answer:A) All other answers

Explanation:

Circular linked chain is the type of the linked list formed that has the first component attached to the last component and every other are connected consecutively .

The circular linked list which is in two section is implemented in the form queue by the methods such as the initializing the nodes and using them when there is the requirement of it or it can also keep the node for the future use.

6 0
3 years ago
How to transfer audio files from computer to android?
fenix001 [56]
U can use Bluetooth connect your computer to the android. <span />
5 0
4 years ago
Other questions:
  • By default, only the ________ options are allowed when the worksheet is protected.
    11·1 answer
  • 1. A video card on a modem motherboard would run best in which type of slot?
    10·1 answer
  • Please help i really need to turn this in already
    6·1 answer
  • A multistep protocol used to identify and control potential threats to food-safety is the
    8·1 answer
  • Quien quiera jugar fortnote en una hora y media o antes pase id
    12·1 answer
  • Help me please and thanks
    8·1 answer
  • What is stored in alpha after the following code executes?
    8·1 answer
  • A cubit is an ancient unit of length, roughly the distance between one’s fingers and elbow. The definition of one cubit is 18 in
    12·1 answer
  • Match the index with the value
    14·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!