1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexus [3.1K]
2 years ago
9

Which load balancing method is not supported in equal cost multipath (ECMP) load balancing, but is supported in SD-WAN

Computers and Technology
1 answer:
zmey [24]2 years ago
8 0

The load balancing method that is not supported in equal cost multipath (ECMP) load balancing, but is supported in SD-WAN is Volume load balancing.

<h3>What is load balancing?</h3>

Load balancing is known to  be one that shares server loads in all of multiple resources  and also in all multiple servers.

Note that this method technique often works to reduce response time, and as such, The load balancing method that is not supported in equal cost multipath (ECMP) load balancing, but is supported in SD-WAN is Volume load balancing.

Learn more about load balancing from

brainly.com/question/13088821

#SPJ1

You might be interested in
Question 1
Alexxandr [17]

Explanation:

so, what do you think ?

I am sure you have used a computer or a smart phone yourself.

how many clicks or taps do you want to do before you you get what you were looking for ?

hmmmm ?

as few a possible, right ?

ideally, of course, this is one (1) click or tap.

7 0
2 years ago
Anu wishes to prepare a program to display the value of numbers from 1 to 25. The program that Anu prepared is given below. Ther
sergiy2304 [10]

Answer:

Programming is a set of instructions i.e. Input given by the user to the computer to perform a particular task and give the desired result i.e. output.

Final Answer

‌s=0

for i in range(1,26):

s=s+ i

print(s)

Explanation:

IF THE ANSWER IS CORRECT THEN MARK A BRAINLEST

5 0
3 years ago
Read 2 more answers
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
V.kofiryfh givnyovb (to slove you must go back 3 letters)
Elena L [17]
Im goin to be honest with you i dont understand this question at all can you xplain it alittle more plz cuz if i go back three letters it is o
7 0
3 years ago
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
fgiga [73]

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

3 0
3 years ago
Other questions:
  • Convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
    12·1 answer
  • A patient presents at an outpatient urgent care facility with an acute illness and is seen by a provider. A detailed history wit
    13·1 answer
  • What is a nonlinear presentation?
    14·2 answers
  • 18) choose which article title would most likely be described by the database subject headings victims of famine, ireland, histo
    14·1 answer
  • What is one way you can learn about your digital footprint?
    13·1 answer
  • Careers on the largest declining industries list will see an increase in the number of employees in their workforce.
    15·1 answer
  • In a c program, if you see a variable in main declared: float farray[20]; describe what farray is
    10·1 answer
  • What is ‘Software Testing’?
    13·1 answer
  • Why do my airpods keep disconnecting from my laptop
    8·2 answers
  • One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!