____________________ are protocols used by routers to make path determination choices and to share those choices with other routers.

Answers

Answer 1

Answer: Routing protocols

Explanation:


Related Questions

which subunit of a heterodimeric cdk is the regulatory subunit?

Answers

The answer is cyclin subunit

To gain access to the functions and variables of a library module, use a(n) _________ statement. A. import B. export C. global D. library

Answers

Answer: import

Explanation:

The software which manages environment for running programs handling error controlling devices configuring the computer system and managing the resources of a computer.
Write the technical term of the given question of the picture .
Correct Answer =⟩ Thanks
Best answer =⟩ Brainliest
Random answer =⟩ Reported and deleted ​

Answers

Answer:

D

Application

System software is the set of programs that enables your computers hardware devices and Application software to work together.

Practical computer systems divide software systems into two major classes: System software: Helps run the computer hardware and computer system itself. System software includes operating systems, device drivers, diagnostic tools and more. ... (Some application software is pre-installed on most computer systems.)

Explanation:

Question 11
Methods that return a decimal value must be declared using what type?


a. int

b. void

c. double

d. String

e. null


Question 12

Which of the following is true when x = 15?


a. (x >= 15) && (x < 13)

b. !(x > 13) || (x > 16)

c. (x > 13) && (x < 17)

d. (x < 15) || (x > 15)

e. (x <= 13) || (x >= 17)

Answers

Answer:

11. a, 12.c

Explanation:

bc numbers must be declared as ints and 15 is greater than 13 but lesser than 17

Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after tax and tip, for a passed in price, assuming tip is always 15% and tax is always 8%?

a. public double getFinalPricel double tips, double tax).
b. public double getFinal Price double tax)
c. public double getFinalPrice/double basePrice, double tips)
d. public double getFinalPrice double basePrice, double tips, double tax)

Answers


D. I hope it helped

This is an image of the ...........................Topology.

if answer Correct i will mark the first person brainly.​

Answers

Answer:

Mesh

Explanation:

what method does a gsm network use to separate data on a channel?

Answers

It uses TDMA method

According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.

Answers

Answer:

a hypothesis that forms into a question.

Explanation:

Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage device would be best for this purpose?
A. Optical disc
B. Cell phone
C. Flash drive
D. HDD

Answers

Answer:

C

Explanation:

Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.

Hope this helped, and sorry if I didn't answer in time.

Brake fluid is made up of a chemical that:​

Answers

hi there!

Brake fluid is a type of hydraulic fluid used in hydraulic brake and hydraulic clutch applications in automobiles, motorcycles, light trucks, and some bicycles. It is used to transfer force into pressure, and to amplify braking force. It works because liquids are not appreciably compressible.

hope this helps.

In the earliest stages of human history, what was the only medium?
ink
books
the human body
magazines

Answers

The only medium that was used for the dissemination of information during the earliest stages of human history is: C. the human body.

Information sharing is an integral part of human life because no human is able to live comfortably in isolation without the need to share or receive messages from others through a particular medium, especially for awareness, growth, development and proper decision making.

Prior to the medieval period, which is the earliest stage of human history, the human body serve extensively as the only medium that was used for the dissemination of information from one person to another.

This ultimately implies that, various symbols, signs and objects that were  mutually understandable to the people were drawn or written on human body, so as to serve as a medium during the process of communication.

Read more: https://brainly.com/question/14810228

difference between boot disk and booting in 5 points​

Answers

[tex]Answer \: -[/tex]

In computing, booting is the process of starting a computer. It can be initiated by hardware such as a button press, or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system.

A boot disk is a removable digital data storage medium from which a computer can load and run an operating system or utility program. The computer must have a built-in program which will load and execute a program from a boot disk meeting certain standards.

Can someone please help

Answers

Answer:

Explanation:

la reponse est le premier et le 3 eme pointcar en effet le premier point c est logiqye e le 2 e aussi  

once multiple layers are selected which keyboard shortcut merges them

Answers

Considering the computer system analysis, when the multiple layers are selected, the keyboard shortcut that merges them is "Ctrl+E for (Windows) or Command+E for (Macbook)."

What Keyboard Shortcut?

Keyboard Shortcut combines keyboard keys to ensure software programs perform specific functions.

Keyboard Shortcuts can be made by a Computer manufacturer as part of the standard functionality of the operating system or application program or made explicitly by the user in a scripting language.

Keyboard Shortcut is different in both Windows and Macbook Operating systems.

Hence, in this case, it is concluded the correct answer is "Ctrl+E for (Window) / Command+E for (Macbook)."

Learn more about Keyboard shortcuts here: https://brainly.com/question/14447287

Which of the following programming scenarios would benefit most from the use of lists?

Answers

The programming scenarios which would benefit most from the use of lists is: B. writing a program to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score).

Computer programming involves the process of designing and developing an executable instructions (codes) or collection of data to perform a specific task.

In Computer programming, a list can be defined as an abstract data type that represents a finite number of either ordered or unordered values. Thus, a list can be used to perform the following tasks:

Store data items.Delete data items.Add data items.

A computer program that is used to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score) would benefit most from the use of lists because it comprises a set of numerical values that can be sorted in either an ordered or unordered array.

Read more on lists here: https://brainly.com/question/15092271

about how many smart devices are active today coinbase

Answers

Considering the latest information released by Statisticà, the number of active smart devices in the world today is 21.5 billion.

What is Smart Device?

Smart Device are generally known as electronic devices, that have the capacity to connect with other device or networks through wireless servers like Bluetooth, Zigbée, NFC, Wi-Fi, LiFi, 5G, etc.

Examples of Smart Devices

Smart devices generally include the following:

SmartphonesSmart cars Smart doorbellsSmart refrigeratorsTabletsPCSmart watches, etc.

Hence, in this case, it is concluded that the correct answer is 21.5 billion.

Learn more about Smart Device here: https://brainly.com/question/24803254

What is the main difference between structured and unstructured data?

Answers

Answer:

answer is 4.

Explanation:

for an instance let's say you've got to make list of students who would stay after school for sports.then you have to collect data such as Student name _gender _the sport he or she will attend to. Then you get three columns of table to do that when you write those you can get a clear information seeing those data..

solve each of the following a. 3x=27 ​

Answers

Answer:

3^(x)=27     x=3

Explanation:

3x3x3 27

:)

3ˣ = 27

Factorise 27.

27 = 9 × 3

27 = 3 × 3 × 3

27 = 3³

So,

3ˣ = 27

=》ˣ = ³

3³ = 27

_____

Hope it helps ⚜

A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a

Answers

Answer:

hot site

Explanation:

what computer is designed for particular application​

Answers

Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it

Explanation:

what information about a cisco router can be verified using the show version command?

Answers

- the routing protocol version that is enabled.
- the value of the configuration register.
- the operational status of serial interfaces.
- the administrative distance used to reach networks.

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users

Answers

A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.

An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.

In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).

Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.

In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.

Read more: https://brainly.com/question/5660386

Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer. ​

Answers

Answer:

The obtaining influence of a dollar is substantially less on the grounds that more cash is made and causes the value of the dollar greenback to diminish, making things increasingly costly. This is called swelling. In any case, when less cash is made, the value of a dollar greenback increments and things turn out to be more affordable. This is called flattening. As the years go on, the purchasing power of a dollar decreases and decreases.

Hope that helps. x

You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of variables should you create? a default variable a user variable an integer variable a float variable

Answers

Answer:A. A default Variable

Explanation:

Answer:

A

Explanation:

Did it on a Test

Pls help me pls I’m struggling

Answers

Answer:Turn Right () Degrees (block)

The turn right () degrees block is a Motion block and a stack block. The block turns its sprite's direction the specified amount of degrees clockwise.

What do software engineers use as tools to provide automated support for the development of the system

Answers

Answer: CASE

Explanation:

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

Answers

Answer: bastion host

Explanation:

3.) The primary storage device that holds the data currently being processed by the computer is​

Answers

Computer memory I hope it works

Answer:

I personally think its a hard drive or something like that,im not a computer expert to be honest

lenny joggy along a trail for 1.35 hours he ran at a pace of 3.2 miles per hour. how far did lenny jog?

Answers

Answer:

Lenny jogged along a trail for 1.35 hours. He ran at a pace of 3.2 miles per hour. How far did Lenny jog? Answer Lenny jogged 4.32 miles.

Explanation:

List three (3) features of first generation computer
PLEASE HELP!!!!!

Answers


Features of first generation computers:

Technology used: vacuum tube.

Machines languages were used to instruct the computer.

Magnetic core memory was used as primary memory.

Electrostatic tubes, Parer tape, punch card, magnetic tape.
Other Questions
find the value of the trigonometric ratio. make sure to simplify if its needed. In the Bohr model of the hydrogen atom, the electron occupies distinct energy states.a. Trueb. False The Assembly Department produced 1,000 units of product during March. Each unit required 1.25 standard direct labor hours. There were 1,300 actual hours used in the Assembly Department during March at an actual rate of $12 per hour. The standard direct labor rate is $12.5 per hour.Required:Assuming direct labor for a month is paid on the fifth day of the following month, journalize the direct labor in the Assembly Department on March 31. What type of evolutionary adaptations did plants acquire to allow them to grow in areas that were not directly on a water source? Consider the probability that no more than 28 out of 304 students will not graduate on time. Choose the best description of the area under the normal curve that would be used to approximate binomial probability.a. Area to the right of 27.5 b. Area to the right of 28.5 c. Area to the left of 27.5 d. Area to the left of 28.5 e. Area between 27.5 and 28.5 Can anyone help plz? How would you answer this question ? What unique things would separate you from other applicants applying for this money? Please fill in only the question marks. What is the IRR for the following project if its initial after-tax cost is $5,000,000 and it is expected to provide an after-tax operating cash outflow of $(1,300,000) in year 1, followed by inflows of $2,900,000 in year 2, $2,700,000 in year 3, and $2,300,000 in year 4?a) 15.57%.b) 17.55%.c) 13.57%.d) 15.75%.e) none of the above. The 52-g arrow is launched so that it hits and embeds in a 1.50 kg block. The block hangs from strings. After the arrow joins the block, they swing up so that they are 0.47 m higher than the block's starting point. How fast was the arrow moving before it joined the block? What mechanical work must you do to lift a uniform log that is 3.1 m long and has a mass of 100 kg from the horizontal to a vertical position? According to Wilson, what was the United Statess goal for the peace treaty? what can you determine was a major issue for people living in new york city in the mid to late 1800'sa. educationb. recreationc. sanitationd. transportationit can only be ONE answer to be correct What branch of government did sonia Sotomayor work in How many milliliters of 0.204 Mol KMnO4 are needed to react with 3.24 g of iron(II) sulfate, FeSO4? The reation is as folows. 10FeSO4(aq) + 2 KMnO4(aq) = 5Fe2(SO4)3(aq) + 2MnSO4(aq) + K2SO4(aq) + 8H2O(l) Reported Speech Pracrice23."I may be early for the meeting" I said.24."How far is the station from our hotel?" The gird asked.25."Come and see ourr new house,"they told us. 1. Choose the correct algebraic equation to represent: the amount decreased by $9 is $42.9-m=429-mm-9=42m-9 express in kg: 3470 grams4 kg 8 g Describe Briefly the Building Activities undertaken by the Neolithic People ANSWER AND ILL GIVE EXTRA POINTS AND EVERYTHING What allows the reader to infer that the daughters are unused to having control?A.They can't make any decisions.B.They allow the nurse to arrange the funeral.C.They defer to their mother's wishes on all matters.D.They spend their days in bed. Read the following excerpt from The American Crisis and answer the question.To see it in our power to make a world happy - to teach mankind the art of being so - to exhibit, on thetheatre of the universe a character hitherto unknown - and to have, as it were, a new creation Intrusted to ourhands, are honors that command reflection, and can neither be too highly estimated, nor too gratefullyreceivedWhat idea does Paine reference in these lines?The colonies are undeserving of discipline by the British,The colonies must seek protection from other nations.The colonies are an example to be followed,The colonies face an uncertain political future,