Which of the following protocols describes a connectionless state and does not use acknowledgements?

A. POP3
B. UDP
C. NTP
D. TCP


Answer: B. UDP

Computer Science & Information Technology

You might also like to view...

__________ is where the attacker forges a signature for a particular message chosen by the attacker.

A. Total break B. Universal forgery C. Existential forgery D. Selective forgery

Computer Science & Information Technology

In an analog representation, objects can take on only specific values. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In object-oriented programming, ________ allows a new class to automatically use all the data and methods of an existing class.

A. reusability B. regression C. scalability D. inheritance

Computer Science & Information Technology

When you include table names in a structure reference it is called a(n) ________ structured reference.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology