answersLogoWhite

0


Verified answer

Tcp/IP

User Avatar

Wiki User

7y ago
This answer is:
User Avatar
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is the disadvantages of HTTP?

Disadvantages of HTTP1. Information sent via HTTP is not encrypted and can pose a threat to your privacy.2. Packet headers are larger than other protocols as they are needed for security and quality assurance of the information being transferred.3. Information sent through a browser can expose your computer to virtual threats. Such information sent through your browser headers can be the name of your computer, your IP address, what OS your are running and any other requested information that the website you have requested wants to know.4. Is slower than other native protocols but is more secure, reliable and can transfer larger chunks of data.


What rules that apply when communicating over computer?

Such rules are called "protocols".


What is meant by 'Protocol'?

Protocols are the set of rules to regulating the procedure of communication over computer networks.


What is the function of network protocols?

Networking protocols, such as TCP/IP, enable computers to exchange data with each other in a meaningful, organized, and efficient way. Computer protocols are similar to human language - if you speak English and you meet someone who speaks German, the protocols (languages) you use to exchange information are incompatible with each other. It is only when you both speak the same language that you can understand each other. Similarly, computers rely on protocols to ensure each computer "understands" what the other computer is sending it. Just as with humans, both computers must use the same protocol if they are to exchange information with each other successfully. Follow the Related Link below to view a Wikipedia article on this topic.


How many protocols run on one computer?

As many as you can select/install. You can in theory run all protocols on most modern operating systems, but you generally only need one now a days, and that is TCP/IP.

Related questions

How is information moved around within a computer?

Information is moved around within a computer by being encoded in the form of bits and being transferred via data buses.


What about coexistance of IPv4 and IPv6 on the same network and What OS supports this?

Quite simply, both protocols must be enabled - both on the computer and on the routers.Quite simply, both protocols must be enabled - both on the computer and on the routers.Quite simply, both protocols must be enabled - both on the computer and on the routers.Quite simply, both protocols must be enabled - both on the computer and on the routers.


What is the disadvantages of HTTP?

Disadvantages of HTTP1. Information sent via HTTP is not encrypted and can pose a threat to your privacy.2. Packet headers are larger than other protocols as they are needed for security and quality assurance of the information being transferred.3. Information sent through a browser can expose your computer to virtual threats. Such information sent through your browser headers can be the name of your computer, your IP address, what OS your are running and any other requested information that the website you have requested wants to know.4. Is slower than other native protocols but is more secure, reliable and can transfer larger chunks of data.


What is process control in information processing?

process control is the processing of relevant information that is read by the computer but first has to be transferred to binary language to be read.


Which information is transferred from the punched tape to the flexible memory of the computer?

It can be anything, but mainly the program to run and/or the data required.


What has the author Marshall T Rose written?

Marshall T. Rose has written: 'The open book' -- subject(s): Computer network protocols, Computer networks, Computer network architectures 'BEEP' -- subject(s): Computer network protocols 'The simple book' -- subject(s): Computer networks, Management, Data transmission systems, Computer network protocols, Simple Network Management Protocol (Computer network protocol), TCP/IP (Computer network protocol), Standards 'The little black book' -- subject(s): Computer network protocols, Electronic mail systems


What are the most common computer protocals?

The most common computer protocols are TCP, FTP, and System32.


What has the author Bruce Hartpence written?

Bruce Hartpence has written: 'Packet guide to core network protocols' -- subject(s): Computer network protocols, TCP/IP (Computer network protocol)


What has the author Fay Turner written?

Fay Turner has written: 'OSI for libraries' -- subject(s): Standards, Libraries, Computer network protocols, Library information networks, OSI (Computer network standard), Communication systems


Can PDA's connect to PC's?

PDA's can be connected to a computer. Files can be transferred from the PDA to the computer and from the computer to the PDA. Data such as phone numbers, addresses and appointments can be synchronized between PDA's and computers so the information can be the updated.


What logical protocols must be configured for internet connectivity?

computer networking


Can two protocols coexist in the same computer without conflict?

Yes, They Can..