1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
3 years ago
8

Which of the following is a property of TCP?

Computers and Technology
1 answer:
Serggg [28]3 years ago
3 0

Answer:

o best effort

Explanation:

beacuse it i think do

You might be interested in
What does NBT stand for?​
Zanzabum

Answer:

National Benchmark Test

Explanation:

7 0
3 years ago
Information that's been collected to help solve a problem is called
Butoxors [25]

Answer:

Data is the correct answer

5 0
3 years ago
Consider a relation BOOKS that holds information about the inventory of books (used or new) in a bookstore with attributes (titl
Yuri [45]

Answer:

See explaination

Explanation:

Somehing is considered functional dependent (FD) if a relationship between two attributes, typically between the PK and other non-key attributes within a table. For any relation R, attribute Y is functionally dependent on attribute X (usually the PK), if for every valid instance of X, that value of X uniquely determines the value of Y.

Please kindly check attachment for the other details.

5 0
3 years ago
NEED HELP FAST TIMED !!!!
Trava [24]

Answer:

oil rings = encloses combustion by closing off the extra space between the block and the head,

crank shaft = connects the engine to the transmition through a series of mechanisms.

gasket = reduces the amount of exhaust inside the cylinder by sealing the cylinder.

Explanation:

3 0
3 years ago
Read 2 more answers
Apakah maksud input dan output ?<br>​
Nana76 [90]

INPUT ADALAH KOMPONEN PIRANTI KERAS YANG MEMUNGKINKAN USER ATAU PENGGUNA MEMASUKKAN DATE KE DALAM KOMPUTER ATAU BISA JUGA DISEBUT SEBAGAI OUTPUT ADALAH DATA YANG TELAH DIPROSES MENJADI BENTUK YANG DAPAT DIGUNAKAN!

4 0
3 years ago
Other questions:
  • Steve wants to become a successful graphic design entrepreneur. Which entrepreneurial approach will help him succeed? A. working
    14·1 answer
  • ​_______ consists of the analysis​ tools, technologies, and processes by which marketers dig out meaningful patterns in big data
    7·1 answer
  • How does information technology most benefit people’s personal and professional lives?
    9·2 answers
  • Any malware software that covertly gathers user information without the user s knowledge, is known as ______ .
    12·1 answer
  • Jack, a skillful hacker targeted a major banking services firm located in Japan, using the LOIC (Low Orbit Ion Cannon) tool, Jac
    5·1 answer
  • ? Question
    6·2 answers
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • What is incorrect about the following code? Suggest a possible revision of the code to correct the error.
    13·1 answer
  • What job does a front-end developer perform?
    15·1 answer
  • Change the file name for index.html to index.php
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!