1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solong [7]
3 years ago
15

________ sets up a point-to-point connection between two computer systems over an Internet Protocol (IP) network. A. Point-to-Po

int Tunneling Protocol (PPTP) B. Accounting Layer 2 Tunneling Protocol (L2TP) C. Internet Security Association and Key Management Protocol (ISAKMP)
Computers and Technology
1 answer:
nlexa [21]3 years ago
4 0

Answer:

The correct answer is PPTP.

Explanation:

PPTP is the protocol that is used to create a connection which is referred to as tunnel and it transports data between two systems over the internet while also securing it with encryption. I hope this answer helps.

You might be interested in
152<br>what is the role of Computer as<br>transforming agent in the<br>Information society.​
hichkok12 [17]
I have a question what grade are you in
8 0
2 years ago
An automatic door at a store has a sensor in front (A0) and behind (A1). The
yanalaym [24]

Answer:

whats the question?

Explanation:

4 0
3 years ago
Explain the RISC and CISC architecture. Comparison of RISC and CISC in detail.
puteri [66]

Answer:RISC(reduced instruction set computer) is the computer used for low level operation by simple command splited into numerous instructions in single clock only and CISC(Complex instruction set computer) is the computer that performs the operation in single instruction.

RISC architecture has hardwired control unit,data cache unit,data path ,instruction cache and main memory as components .CISC architecture persist of  control unit,micro program control memory, cache, instruction and data path and main memory.

The differences between RISC and CISC are as follows:-

  • The instruction in RISC are less and and low complexes while CISC has several number of complex instruction.
  • The calculation done by RISC are precise and quick whereas CISC has slightly slow calculation processing.
  • The execution of RISC is faster as compared to CISC.
  • RISC uses hardware component for implementation of instruction because it does not persist its own memory and CISC implements instructions using its own memory unit .

6 0
3 years ago
A communication between two devices is over the maximum limit of an ethernet frame size. The Transmission Control Protocol (TCP)
umka2103 [35]

Answer:

D. Sequence number

Explanation:

The sequence number facilitates the keeping track of many segments. This enables it to determine which segments out of many in which it should be in. The sequence number field is usually 32 bits.

Sequence numbers are used in transmitting data because of their importance. Since data is transmitted in packets, they can be lost and as such the receiver uses the sequence numbers to reorder them.

6 0
3 years ago
Which examples are credible sources that could be used for an essay on the environment? Pick all that apply.
ahrayia [7]

Answer:

article, website run by non profit, website for fed agency

8 0
3 years ago
Other questions:
  • The next four octal numbers after 36 is:________.
    10·1 answer
  • Which answer would it be?
    12·1 answer
  • One acre of Land is equivalent to 43,560 square feet. Write a program that ask the user to enter the total square feet of a piec
    5·1 answer
  • echnician A says that underinflation can increase the rolling resistance of a tire. Technician B says that underinflation can ca
    9·1 answer
  • Which of the following is not a valid SQL command? (Points : 2) UPDATE acctmanager SET amedate = SYSDATE WHERE amid = 'J500';
    11·1 answer
  • What happens when a dataset includes records with missing data?
    9·1 answer
  • Please help with this
    8·1 answer
  • What is the output of the following code snippet if the variable named cost contains 100? if cost &lt; 70 or cost &gt; 150 : dis
    8·1 answer
  • How do you handle sensitive data?
    15·1 answer
  • Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!