1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
3 years ago
9

Interior gateway protocols are used by routers in order to share information within a single

Computers and Technology
1 answer:
jenyasd209 [6]3 years ago
6 0
Interior gateway protocols (IGP)are used by routers in order to share information within a single autonomous system. IGP<span> is used for exchanging routing information between gateways (commonly routers). </span><span>An autonomous system (AS) is a network or a collection of networks that are all managed and supervised by a single entity or organization.</span>
You might be interested in
What are the five types of docs you can create an share with google docs
Mademuasel [1]

Answer:

Documents: For composing letters, flyers, essays, and other text-based files (similar to Microsoft Word documents)

google sheets logo Spreadsheets: For storing and organizing information (similar to Microsoft Excel workbooks)

google slides logo Presentations: For creating slideshows (similar to Microsoft PowerPoint presentations)

google forms logo Forms: For collecting and organizing data

google drawings logo Drawings: For creating simple vector graphics or diagrams

Explanation:

8 0
3 years ago
Read 2 more answers
Windows organises information on computer using a
zhuklara [117]
The correct answer is b folder
6 0
3 years ago
Read 2 more answers
A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
balu736 [363]

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

7 0
2 years ago
Jed is the database administrator for a mid-sized computer component manufacturer. He is responsible for validating the data mod
svet-max [94.6K]

Answer:

Development task is the correct answer to the given question.

Explanation:

The database administrator is responsible for managing the database management system . The overall security of the database is depended on the database administrator.

The Development task include the following function  

  • Verification of the data model that is used by the database management system .
  • Check the user input it means validating the data.
  • Defining the overall requirement to create the model.
  • Providing backup when the data is loss .

So the Development task is the correct answer.

3 0
3 years ago
Computer design software requires __________________ to be used properly and successfully by architects.
murzikaleks [220]
<span>The answer is letter B. An arrangement of directions and related documentation that instructs a PC or how to play out an undertaking or it can mean all the product on a PC, including the applications and the working framework. I hope the answer helps. </span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which functions are performed by server-side code??​
    10·1 answer
  • IF YOU KNOW THE ANSWER TO THIS PLEASE ANSWER ASAP
    12·1 answer
  • The device that links computers via communication lines is called the:
    15·1 answer
  • Explain how each of the five types of prewriting assist a writer in getting started. please make it short.
    15·1 answer
  • Which technology is predominately used for contactless payment systems?
    11·1 answer
  • Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
    15·2 answers
  • Write a program to create a customer bill for a company. The company sells only five products: TV, DVD player, Remote Controller
    12·1 answer
  • Which of the following is not a storage medium?
    14·2 answers
  • Write a program to input a number and check whether it is even or odd number
    7·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!