1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
13

When all routers in a network agree on the path from one point to another, the network is said to be what,?

Computers and Technology
1 answer:
Zielflug [23.3K]3 years ago
5 0
<span>When the routing table are complete because they include information about all networks in the internetwork, they are considered converged.</span>
You might be interested in
Which tab of the ribbon includes the links group for creating hyperlinks or internal references?
Deffense [45]
The correct answer is D.File
5 0
4 years ago
Read 2 more answers
The file includes 4993 tweets including the keyword 'election'. Each tweet is represented in a separate line. Write a program to
Likurg_2 [28]

Answer:

import re

with open("../../Downloads/Tweets.txt","r", encoding="utf-8") as tweets:

   myfile = tweets.readlines()

   for item in myfile:

       item = item.rstrip()

       mylist = re.findall("^RT (.*) ", item)

       if len(mylist) !=0:

           for line in mylist:

               if line.count("#") >=1:

                   ln = line.split("#")

                   dm = ln[1]

                   print(f"#{dm}")

Explanation:

The python source code filters the document file "Tweets" to return all tweets with a hashtag flag, discarding the rest.

7 0
3 years ago
Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO) A. An at
Elza [17]

Answer:

A. An attacker could potentially perform a downgrade attack.

E. The IPSec payload reverted to 16-bit sequence numbers.

Explanation:

When both strong and weak ciphers are configured on a VPN concentrator, the following are likely to occur;

An attacker could potentially perform a downgrade attack

The IPSec payload reverted to 16-bit sequence numbers

3 0
3 years ago
Qué es una magnitud eléctrica
IRISSAK [1]
I only speak English
5 0
3 years ago
Which statement regarding dialogues in multiplayer games is true? Dialogues are based only on players’ actions.
emmainna [20.7K]

D. Dialogues are based only on events that have occurred in the game.
8 0
4 years ago
Read 2 more answers
Other questions:
  • The ______ identifies the path for the currently open folder
    8·2 answers
  • What are the three major functions of a game engine?
    13·1 answer
  • How much space should be allotted to park your vehicle parallel to the curb?
    5·1 answer
  • Using the Sakila database, create a query that displays the film title, description, as well the actor first and last name for a
    12·1 answer
  • In cell D5, enter a formula to calculate the number of days for the first workshop. Add 1 to the results to include the total nu
    11·1 answer
  • A(n) ________ operator, such as the greater than or less than symbol, can be used in a query criterion to limits the results pro
    12·2 answers
  • In the URL, what is the subdomain and what is the domain name?
    5·1 answer
  • Which of the following is the BEST solution to allow access to private resources from the internet?
    9·1 answer
  • The template code provided is intended to check whether an integer entered by the user is outside of the range 20-29 (inclusive)
    9·1 answer
  • Your welcome 95 points gg
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!