1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
12

Explain the factors involved in selecting a routing protocol to be used on a network.

Computers and Technology
1 answer:
expeople1 [14]3 years ago
5 0

Answer:

To choose a routing protocol you should consider these factors:

  • Configuration  
  • Efficiency  
  • Size and topology

Explanation:

  • Configuration factor is that how easy is to configure and troubleshoot the protocol. Configuration is a factor need to be in count while selecting a routing protocol e.g. RIP V1, IGRP are easy to configure and OSPF V2 configuration is not simple.
  • Efficiency is that how fast it converges? How much bandwidth it uses?  how much efficient is that protocol is? Convergence of IGRP is slow and for OSPF is quick.

  • Convergence: The process that a routing protocol goes through to alert all routers on the network of the next available path when the primary path becomes unavailable.
  • Size and topology means how much large network it can handle and what topology is using is the network a star? partial mesh? full mesh?

I hope it will help you!

You might be interested in
The field that uses technology to manipulate and use information to improve healthcare is known as:_______
Sergeu [11.5K]

Answer:

Health informatics

Explanation:

7 0
2 years ago
Owen is writing a program that will lock his computer for one hour if the incorrect password is entered more than five times. Ha
kiruha [24]

Answer:

Your answer is <em>I think </em>A) A loop

Explanation:

In computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached.

5 0
3 years ago
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
A level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organ
rewona [7]

Answer:

Option D is correct.

Explanation:

A high-level safety violation could be anticipated to have a serious or disastrous negative impact on organisational activities, organisational assets.

The effect of the violation on an organisation may be staggering, and sometimes unknown until the outcomes are achieved. It is strange that, owing to harmful or neglectful acts, the greatest incidents of compromise come from within the business ; it requires time for an organisation to recover.

8 0
3 years ago
What is the minimum number of bits you need to encode the 26 letters of the alphabet plus a space?Pace?
Andrei [34K]

Answer

5 bits

Explanation

A bit is the least or the smallest unit of data in a computer. They are  the units of information in information theory, consisting of the amount of information required to specify one of two alternatives 0 and 1. This is because A bit has a single binary value, either 0 or 1

If you use roman alphabet A to Z lets use log 2(26)=4.7 bits. when you round off it will be 5 bits.

8 0
3 years ago
Other questions:
  • What is a function library?
    11·1 answer
  • Which of the following is the main consideration when choosing an appropriate outlet box?
    7·2 answers
  • An application needs to calculate sales tax for purchases. You decide to simplify the code by putting the sales tax calculation
    9·1 answer
  • Which is the first thing that would happen if a plant could NOT obtain carbon dioxide? A It would not be able to reproduce. B It
    5·1 answer
  • Computer design replaced ______________
    6·1 answer
  • These icons cannot be removed from the Dock. Finder e-mail music player Trash
    14·1 answer
  • Netflix shows to watch?
    11·2 answers
  • Which tool allows users to share code and also serves as a social networking
    10·1 answer
  • A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause thi
    12·1 answer
  • What are the value and data type (float, int, bool, or str) of this expression:<br> 5 // 2
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!