Describe how the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) differ from each other, and provide examples of where each might be used.
What will be an ideal response?
ANSWER: The Transmission Control Protocol (TCP) makes a connection with the end host, checks whether the data is received, and resends it if it is not. TCP is, therefore, called a connection-oriented protocol. TCP is used by applications such as Web browsers and email. Guaranteed delivery takes longer and is used when it is important to know that the data reached its destination. The User Datagram Protocol (UDP) does not guarantee delivery by first connecting and checking whether data is received; thus, UDP is called a connectionless protocol or best-effort protocol. UDP is used for broadcasting, such as streaming video or audio over the Web, where guaranteed delivery is not as important as fast transmission. UDP is also used to monitor network traffic.
You might also like to view...
A secret message has been encrypted with a key that is as long as the message itself. The key will be used for only this message. The type of encryption used here is:
a. Running key cipher b. One-time cipher c. One-time pad d. Diffie-Hellman
Select the browser’s action when you configure BOTH a background color and background image for the body selector.
a. display the background color instead of the background image b. will display no background for the page because it is “confused” c. display the background color while the background image loads and before the background image is displayed d. do none of the above
What is a histogram and how is it beneficial to understanding data?
What will be an ideal response?
Revenge porn is a special case of
a. cyberbullying. b. Internet addiction. c. child abuse. d. identity theft. e. censorship.