1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
3 years ago
14

What default length is used for the ospf dead interval?

Computers and Technology
1 answer:
Molodets [167]3 years ago
7 0
I believe that the length would actually only be held "4" times in this case. Sense this use of "ospf" would only have so much capacity, there would only be a limited access that you would be able make a default change.<span />
You might be interested in
Limitations of systems analysis and design​
Sonja [21]

Answer:

<h3 />

Explanation:

<h3>Although System analysis offers an extensive range of benefits it might also have some disadvantages. One of the main disadvantages which is mostly overlooked is the risk of too much analysing which may be costly and time consuming. It is therefore part of the analyst's job to find the right balance.</h3>
6 0
3 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
3 years ago
Using tracking code, Google Analytics can report on data from which systems? (select all answers that apply)
Jobisdone [24]

Answer:

a b c

Explanation:

they can report data from these three options

6 0
3 years ago
The race car driver nicknamed Neiblemeister - master of the mist, was married to what famous female aviator?
user100 [1]
<h2>ANSWER: ELLY BEINHORN</h2>

The race car driver Neiblemeister- master of the mist, was married to <em>Elly Beinhorn</em> who was a famous female aviator. In 1936 Beinhorn married the well-known racecar driver Bernd Rosemeyer, who died in a car accident years later, only ten weeks after the birth of their son Bernd. She remarried in 1941 and within a year gave birth to a much-longed-for daughter, whom she named Stephanie.

7 0
3 years ago
Read 2 more answers
HOW IS THE AUTOFILL FEATURE HELPFUL? A.IT CREATE A NEW FORMULA FOR EVERY CELL IN THE DOCUMENT B.IT CAN SAVE TIME BY ALLOWING YOU
bulgar [2K]
B. it can save time by allowing you to quickly fill cells
4 0
4 years ago
Other questions:
  • Derek, a project manager, needs to create a plan for a software development project. Which approach or document will help him de
    15·1 answer
  • Tables draw your attention to specific information in a spreadsheet. Please select the best answer from the choices provided T F
    10·1 answer
  • You are setting up a desktop computer for an AutoCAD specialist who needs a minimum of 125GB of RAM. Which operating system belo
    6·1 answer
  • Question 12 :A user complains that his computer is taking a long time to boot. During the boot process, you observe that the har
    7·1 answer
  • Which firewall has a network interface located in a unique network segment that allows for true isolation of the segments and fo
    9·1 answer
  • Improvements in technology make the world seem larger to people.<br> a. True<br> b. False
    6·2 answers
  • PLEASE HELP ASAP (answer is needed in Java) 70 POINTS
    15·1 answer
  • Help please what is the answer , thanks!!!
    13·1 answer
  • Stress is an illness not unlike cancer.<br> True<br> False
    6·2 answers
  • What is a worm?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!