1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
2 years ago
8

The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resen

ds lost packets. It attempts to fix bad packets but does not resend lost packets. It does not attempt to fix bad packets or resend lost packets. It fixes bad packets and resends lost packets.
Computers and Technology
1 answer:
DochEvi [55]2 years ago
4 0

Answer:

The User Datagram Protocol (UDP) is called the connectionless protocol because:

It does not attempt to fix bad packets or resend lost packets.

Explanation:

Ports are openings or entrance doors through which data packages have access to a PC or server.  TCP and UDP are transport protocols with port numbers.  TCP means Transmission Control Protocol.  They are used to connect two devices over the internet and other networks.  UDP means User Datagram Protocol.  They are used to connect applications and to speed the transfer of data.  Comparatively, UDP is faster, simpler, and more efficient than TCP.  TCP enables retransmission of lost data packets, which UDP cannot do.

You might be interested in
I need help 50 points and brainless if you answer
nata0808 [166]

Answer:

50

var X gets passed into the rectangle function, which I assume would set the x and y coordinates to what the var's have already been set to.

4 0
2 years ago
Read 2 more answers
Write a line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values.
Valentin [98]

Answer:

A line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.

Here,

const int MAX = 25;

7 0
2 years ago
Why do we allow electronic instruments to warm up before use?
son4ous [18]
Is not really a warm up!

we wait for the computer (electronic instrument) to load or process all the data in order to operate properly as its supposed to!
3 0
3 years ago
Stonewalling sends a(n) ______ message to the other person.a. assertive messageb. confirmingc. disagreeingd. disconfirminge. com
schepotkina [342]

A financing fee is computed by taking your annual percentage rate, or APR, the amount you owe, and the time period into account.

<h3>What is finance charge of credit card?</h3>

The interest you'll pay on a loan is defined as a finance charge, and it's most commonly used in the context of credit card debt. A financing fee is computed by taking your annual percentage rate, or APR, the amount you owe, and the time period into account.

Given that,

Interest rate = 15.5%

Date: 1-3 (3 days)

Average daily balance = amount paid × day

 = $200 × 3 = $600  

Date: 4-20 (17 days)

Average daily balance = amount paid

= $300 × 17 = $5100  

Date: 21-30 (10 days)

Average daily balance = amount paid × days

= $150 × 10 = $1500  

So, total average daily balance for the month

= $(600+5100+1500)

= $7200

Now, the finance charge = $7200 × (15.5÷1

  = $93.00

Therefore, A financing fee is computed by taking your annual percentage rate, or APR, the amount you owe, and the time period into account.

To know more about finance charge refer to,

brainly.com/question/22717601

#SPJ1

6 0
11 months ago
What is an ad's target audience composed of
solmaris [256]
C. An ad targets an audience the creators hope will but the product.
3 0
3 years ago
Other questions:
  • Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
    14·1 answer
  • "a terminal has two input queues." as a user types each character to the terminal, it is collected in the ____ queue.
    5·1 answer
  • __________ is a network project that preceded the internet.
    6·1 answer
  • __________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of
    11·1 answer
  • To access documents stored on a "cloud", you'll
    12·1 answer
  • I need help!!! i will make you a brainliest!!
    10·1 answer
  • Time shifting occurs when
    8·2 answers
  • Consider the following method, remDups, which is intended to remove duplicate consecutive elements from nums, an ArrayList of in
    7·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
  • There is overlap in the subjects of study in the different information technology disciplines.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!