answersLogoWhite

0


Best Answer

Answer(Techsupport)

Yes,The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite. TCP is so central that the entire suite is often referred to as "TCP/IP". Whereas IP handles lower-level transmissions from computer to computer as a message makes its way across the Internet, TCP operates at a higher level, concerned only with the two end systems, for example a Web browser and a Web server. In particular, TCP provides reliable, ordered delivery of a stream of bytes from one program on one computer to another program on another computer. Besides the Web, other common applications of TCP include e-mail and file transfer. Among its management tasks, TCP controls message size, the rate at which messages are exchanged, and network traffic congestion.

User Avatar

Wiki User

15y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

15y ago

No way

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Can two computer program one using TCP connection and other using UDP connection use the same port number at the same time?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What other test could you perform to prove that it was your computer's firewall that was blocking the connection and not the firewall on the computer you are using as a client?

The test that can prove which computer's firewall is blocking a program from running is to turn off the firewall on the computer being used, then try to run the program in question. If the program still doesn't work, then the main computer is blocking the program.


What other test could you perform to prove that it was your computers firewall that was blocking the connection and not the firewall on the computer you are using as a client?

The test that can prove which computer's firewall is blocking a program from running is to turn off the firewall on the computer being used, then try to run the program in question. If the program still doesn't work, then the main computer is blocking the program.


What is the computer program Xerox?

There is no single computer program called "Xerox." The Xerox Corporation offers a number of different programs to support the use of some of the printers that they market, and for other functions.


Is the sky home page on a secure connection?

The sky home page connection is as secure at the connection you have on your computer. The Sky homepage suggests you use virus protection programs to protect your computer. It's as secure as other connections on your computer.


What is necessary to make a remote connection to a person's desktop computer?

According to Windows Microsoft, in order to make a remote connection to a person's desktop computer, two computers are needed. And then a Remote Desktop application is needed in order to connect to the other computer.


Is the Intel Desktop Board D945 suffient enough for a ten computer connection?

The Intel Desktop Board D945 will not be enouh for a ten computer connection other hardware will be needed.


What does RegClean do for your computer?

The RegClean program allows you to fine tune your pc automatically to speed up the computer. The program will scan your computer for free and check your registry and many other parts of your computer.


Is there another computer program other then windows?

Macs-they are better


What type of program is a backdoor?

They are computer viruses that let hackers and other viruses in to your computer undetected. They are computer viruses that let hackers and other viruses in to your computer undetected.


I have a Quicken program on Windows 98 that I need to transfer to another computer. What's the best way to do it?

Run the installer for the Quicken program on the other computer.


If you connect a computer that has a virus to a computer that doesnt have a virus will the computer that doesnt have a virus get one?

Only if you transfer an infected file to the un-infected computer is it possible, or if you have an open connection where the infected computer may send (without permission) code, or files -like SQL injectors-. One other way is if you have a connection where you're connected to a server through the other computer that lets the infected computer 'ping' (another way of sending code to comfirm connection status).


What is the name of the computer program used in kindergarten and elementary school to learn Math and English where the characters were aliens?

The program is called Number Munchers and teaches addition, subtraction, multiplication, division, basic number theory, factoring and other arithmetic topics.