1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
9

In an LAN domain, _______________ is similar to a hub but can filter traffic, a ______________ connects LANs, or a LAN and a WAN

, and a ______________ is a software or hardware device that filters traffic in and out of a LAN.
Computers and Technology
1 answer:
Alex17521 [72]3 years ago
4 0

Answer: Switch, router, firewall

Explanation:

The function of the switch is to distribute the network to different networks similar in functioning to that of the hub but it performs filtering of the traffic present in the network using various traffic filtering algorithms.

The router whose main function is to route packets across the network is also used to connect between LANs and between LAN and a WAN.

The firewall is typically installed on systems or in servers or in routers with it most important function to filtering the traffic and minimize the packet delivery delay in LANs.

You might be interested in
Though most of the content on this social network is uploaded by amateurs, many companies offer streaming video content related
Nikitich [7]
The answer to this is the youtube channel. The youtube channel is very common and very popular to everyone. Each and every one of us could not deny that we would watch a video from youtube maybe at least once a day. Youtube is very effective, it is also very efficient and easy to use.
6 0
3 years ago
Which key retains its uniqueness even after you remove some of the fields?
Natasha_Volkova [10]

Answer:

Primary key retains its uniqueness even after you remove some of the fields.

Explanation:

I am assuming that this question is related to database. Therefore, I am answering it according to database context.

In database, you can have multiple rows and columns. Each column shows a specific attribute while each row plots the data according to the attributes. However, there is the first column of each of main table that has unique set of values. It is called the Primary Key. Some key features of primary key are:

  • It always contains the unique value.
  • Its value cannot be null.
  • A table can have at max one primary key.
  • It can be the combination of multiple columns but it must be unique.

Therefore, the primary key has the ability to retain its uniqueness even after you remove some of the fields.

8 0
4 years ago
What is the small window that pops up in a application that requieres a response for the user
Marina CMI [18]

Answer:

that is called a popup box. or a alert box

assuming you are talking about this

3 0
3 years ago
Read 2 more answers
If you want smaller tables to fit on a single page?
Vinil7 [7]
Well what i do is i make every thing a little smaller and if that dose not work make it bigger so that it just gos over the bottom of the page
8 0
3 years ago
In 2016, what was the most popular goggle search?
sineoko [7]
Trump. Getty/ Sara D. ...
David Bowie. Jo Hale/ Getty Images. ...
Olympics. David Ramos/Getty Images. ...
Slither.io. Slither.io. ...
Pokémon Go. Reuters. ...
Hurricane Matthew. Joe Raedle/Getty Images. ...
Prince. Jonathan Daniel/Getty Images. ...
Powerball. Justin Sullivan/Getty Images. It was a year of massive, million-dollar Powerball drawings.
5 0
3 years ago
Other questions:
  • Ideation includes all of the following EXCEPT
    5·1 answer
  • Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work
    13·2 answers
  • In the CIA Triad, "Confidentiality" means ensuring that data is
    9·1 answer
  • Which of the following are common navigation elements? (Choose all that apply.)
    5·1 answer
  • In the MARS Marketing Management Simulation, the results of your marketing mix decisions:
    9·1 answer
  • Chief technology officers typically earn more working for private companies than for schools or universities.
    15·2 answers
  • Which of the following is NOT areserved word in Java?intpublicstaticnum
    9·1 answer
  • During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those por
    12·1 answer
  • What is the full form of 'Rom<br>​
    7·2 answers
  • Answer pls pls pls pls ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!