1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
3 years ago
15

The action in which a router divides and forwards incoming or outbound message traffic to multiple links is known as

Computers and Technology
1 answer:
kipiarov [429]3 years ago
5 0
Load balancing is my best guess.
You might be interested in
Which of the following best describes the difference between the domain and path of a URL?
Lana71 [14]

Answer:

the first choice

Explanation:

8 0
3 years ago
Select the correct statement below about database services or database instances:
Zigmanuir [339]

The correct statement about database services or database instances is

( B).<u>An instance of the cloud database operates as a service that handles all application requests to work with the data in any of the databases managed by that instance.</u>

<u />

Explanation:

An instance of the Database Engine can be defined as a service that <u>all application requests to work with the data in any of the databases managed by that instance.The data can be on the same system or can be on another system </u>

So in case of a Cloud based database engine

( B).<u>An instance of the cloud database operates as a service that handles all application requests to work with the data in any of the databases managed by that instance.</u>

<u />

8 0
3 years ago
Your boss wants you to configure his laptop so that he can access the company network when he is on the road. You suggest a VPN
Rashid [163]

Answer:

All traffic that flows between the laptop and VPN server is encrypted.

Explanation:

A Virtual Private Network (VPN) is a "tunnel" connection between computers that performs just like a regular point-to-point network connection (that is, IP address to IP address).  It has the added feature that encryption is enabled so that no intermediate server (or computer or line monitor, etc.) can decode the information that is in the data portion of the packets.

5 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transacti
faust18 [17]
GUI (graphical user interface)
6 0
3 years ago
Other questions:
  • What is the output of the following code snippet? double income = 45000; double cutoff = 55000; double minIncome = 30000; if (mi
    14·1 answer
  • What is the seventh byte in the roller coasters file?
    12·1 answer
  • Who is typically considered to be the father of computing
    6·1 answer
  • What refrigerant has been approved for new household refrigerators and freezers
    14·1 answer
  • Joel has left his computer unattended while answering a phone call. A TV repairer in his house tries to surf through the applica
    13·1 answer
  • Plz can someone tell me the answers ?
    13·2 answers
  • Write a method so that the main() code below can be replaced by simpler code that calls method calcMilesTraveled(). Original mai
    11·1 answer
  • #done with school already
    14·1 answer
  • True or false scientists investigate and seek to explain the natural world
    14·1 answer
  • What is ‘situational awareness” in game design?please answer in a full sentence!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!