Which one of the following terms is not normally used to describe the Transmission Control Protocol (TCP)?

a. Reliable
b. Connectionless
c. Error-checking
d. Guaranteed delivery

Answer: b. Connectionless

Computer Science & Information Technology

You might also like to view...

Pinterest is like Facebook but with only ________

A) pictures B) music C) themes D) categories

Computer Science & Information Technology

Sam is a security risk analyst for an insurance company. He is currently examining a scenario where a hacker might use a SQL injection attack to deface a web server due to a missing patch in the company's web application. In this scenario, what is the vulnerability?

A. Unpatched web application B. Web defacement C. Hacker D. Operating system

Computer Science & Information Technology