The TCP protocol is used at the _______ layer of the OSI model

a. Application
b. Presentation
c. Network
d. Transport


D.

Computer Science & Information Technology

You might also like to view...

When exporting from Access to Word, you are not able to analyze the data in Word

Indicate whether the statement is true or false

Computer Science & Information Technology

Why are words such as monkey, smile, and freedom not good to use as passwords?

A) They are in password crack dictionaries. B) They are easy to guess. C) They are easy to see when typing. D) They are the three most commonly used passwords.

Computer Science & Information Technology

A combination check is a data validation rule that tests to ensure that a data item fits the required data type.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which view do you choose if you want to add a picture to a slide?

What will be an ideal response?

Computer Science & Information Technology