1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
6

Which feature of a router provides traffic flow and enhances network security?

Computers and Technology
1 answer:
Vika [28.1K]3 years ago
6 0
The answer would be...<span>ACLs</span>
You might be interested in
Modify the Eggs program to create a new one named EggsInteractive that prompts the user for and accepts a number of eggs for eac
rjkz [21]

Please provide the eggs program!

7 0
3 years ago
If a flagged word is spelled correctly, such as many of our names, right-click it and then click ____ on the shortcut menu to in
cluponka [151]

Answer:

Either, "Ignore all" or "add '...' to dictionary"

Explanation:

If "Ignore all" is clicked, the software will ignore all the words which it believes is incorrect currently written. Whilst, adding it to the dictionary, the word will always be seen as spelt correctly on the application. Therefore, both get rid of the flagged word, but one is permanent.

4 0
2 years ago
What connects data center to your device?
konstantin123 [22]

My answer to the question is ISP(Internet Service Provider).

4 0
4 years ago
What are the advantages of customer relationship managment​
Delvig [45]

Answer:

Enhances Better Customer Service.

Facilitates discovery of new customers.

Increases customer revenues.

Helps the sales team in closing deals faster.

Enhances effective cross and up-selling of products.

Simplifies the sales and marketing processes.

Makes call centers more efficient.

Enhances customer loyalty.

3 0
3 years ago
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
ankoles [38]

<u>Explanation:</u>

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major <u>advantage</u> of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main<u> disadvantage</u> of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. <u>A major </u><u>advantage</u><u> of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), </u><u>a disadvantage.</u>

6 0
3 years ago
Other questions:
  • Sue needs to add a header and a footer to a presentation. Which process should she use to do this?
    10·2 answers
  • You csn access various sites on the www by using hyperlinks or by
    7·1 answer
  • Types of relationships include aggregation, composition, link, generalization, and specialization 9. TRUE FALSE
    9·1 answer
  • Are scripted languages easier or more difficult to port than programming languages? Why?
    6·1 answer
  • If an additional term relates to payment, quality, quantity, price, time, and place of delivery, the CISG considers the added te
    12·1 answer
  • What is the difference between cybercrime and cyber security?
    12·1 answer
  • Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the cont
    11·1 answer
  • java Two smallest numbers Write a program that reads a list of integers, and outputs the two smallest integers in the list, in a
    6·1 answer
  • Jacob was sitting in class. His teacher understands that he is the type of student that doesn't comprehend when he sees or hears
    6·1 answer
  • What note for percussun is this??
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!