adplus-dvertising
frame-decoration

Question

TCP is a __________protocol.

a.

stream-oriented

b.

message-oriented

c.

block-oriented

d.

none of the above

Posted under Networking

Answer: (a).stream-oriented

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. TCP is a __________protocol.

Similar Questions

Discover Related MCQs

Q. TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes.

Q. Because the sending and the receiving processes may not write or read data at the same speed, TCP ________.

Q. TCP groups a number of bytes together into a packet called a ___________.

Q. TCP is a ___________ protocol.

Q. TCP is a(n) _______ transport protocol.

Q. TCP uses _________________ to check the safe and sound arrival of data.

Q. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.

Q. TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.

Q. Communication in TCP is ___________.

Q. The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.

Q. The acknowledgment number is ________.

Q. The value of the window size is determined by _________.

Q. The inclusion of the checksum in the TCP segment is ________.

Q. A TCP segment is encapsulated in __________.

Q. Connection establishment in TCP is called __________ handshaking.

Q. A SYN segment cannot carry data; it consumes _____ sequence number(s).

Q. A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s).

Q. An ACK segment, if carrying no data, consumes ______ sequence number(s).

Q. The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.

Q. The SYN flooding attack belongs to a group of security attacks known as a _____ attack.