1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
15

In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the

second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
Computers and Technology
1 answer:
allochka39001 [22]3 years ago
4 0

Answer: Routing table

Explanation:

  Routing table is basically used to store the network route information in the form of data file in the random access memory (RAM). It mainly store information about the various types of connection and the remote network.

The routing table contain two columns and the first column is basically used for listing the every networking device and the computer system.

On the other hand, the second column s basically used to list about the destination device in which the computer wants to send a message. The main function of the router is to forward the packet to its actual destination by using the routing table.

You might be interested in
Which technique helps you look confident as a speaker?
navik [9.2K]
Make eye contact with the audience while presentating.
6 0
3 years ago
A student registers for a course in a university. Courses may have limited enrollment i.e a student must
inna [77]

Answer:

Follows are the complete question to the given question:

Explanation:

The UML scheme is a UML-based diagram intended to depict the system visually, together with its key actors, roles, activities, objects, and classes, to gather information the about system, change that, or maintain it.

Every complex process is better understood via sketches or pictures. These diagrams have a higher understanding effect. By glancing about, we notice that diagrams are not a new idea but are widely used in various business types. To enhance understanding of the system, we prepare UML diagrams. There is not enough of a single diagram to represent all aspects of the system. You can also create customized diagrams to satisfy your needs. Iterative and incremental diagrams are usually done.

There are two broad diagram categories and that they are broken into subclasses again:

  • Diagram structure
  • Diagrams of behavior

Please find the graph file of the question in the attachment.

7 0
3 years ago
Please please help I don’t understand this
Firlakuza [10]
The answer is D, “Check for Accuracy”. You have to make sure everything is accurate at the end.
8 0
3 years ago
'|'/2`/ '|'[] |)[-([]|)[- '|'#!$
natita [175]

Answer: mr Man

Explanation:

7 0
3 years ago
In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
hram777 [196]

Answer:

The program to this question can be given as:

Program:

factorial=1 #declare a variable.  

number=int(input("Enter a positive integer:")) #input a number.  

while (number>0): #loop  

   factorial= factorial*number # holding value in factorial variable  

   number=number-1  

print('=',factorial) #print value.

Output:

Enter a positive integer:6  

= 720  

Explanation:

The description of the above python program can be given as:

  • In the above program firstly we define a variable that is "factorial". In this variable, we assign a value that is 1 and it is used to calculate the factorial value.  
  • We define a variable "number". The number variable is used to take input from the user.  
  • Then we define a loop in the loop we calculate the factorial and hold the value in the factorial value in the last we print the value.  

4 0
3 years ago
Other questions:
  • you want to discard your old computer ,want to securely erase that data from your hard drive. what can you use to do this and wh
    12·1 answer
  • What is the keyboard shortcut Ctrl+Z used for?
    14·2 answers
  • What is transaction model?
    9·2 answers
  • What is a central location that houses Joint Information System (JIS) operations and where public information staff perform publ
    6·1 answer
  • Three of the most important jobs of security management are to ensure _____ are organized according to sensitivity, ensure that
    10·1 answer
  • True or False: When you share something on a friend’s Timeline, only that friend can see it.
    5·2 answers
  • Give an idea of a law u would like to create
    5·2 answers
  • 1. Which of the following cables are used in networking? Check all that apply.
    8·2 answers
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
  • Difine the term pigment​
    14·3 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!