1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
10

The _________ in an internet are responsible for receiving and forwarding packets through the interconnected set of networks and

making routing decisions based on knowledge of the topology and traffic/delay conditions of the internet.
Computers and Technology
1 answer:
raketka [301]3 years ago
3 0

Answer:

routers

Explanation:

<h2><em><u>Fill in the blanks</u></em></h2>

The<u> routers </u> in an internet are responsible for receiving and forwarding packets through the interconnected set of networks and making routing decisions based on knowledge of the topology and traffic/delay conditions of the internet.

You might be interested in
Why would someone make a histogram instead of a bar chart?
Natasha_Volkova [10]

Answer:

Someone can make a histogram instead of a bar chart if distributions of variables are need to be represented and if data is quantitative.

Explanation:

Histograms are drawn to represent distributions of variables whereas bar charts are used to compare various variables. Histograms plot quantitative data whereas bar charts plot categorical data.

So, someone can make a histogram instead of a bar chart if distributions of variables are needed to be represented and if data is quantitative.

8 0
3 years ago
Being able to express your thoughts in an email is a primary technology skill. true or false.
Zina [86]

almost everywhere else I've found this question the answer was false so i hope that helps.

5 0
3 years ago
Read 2 more answers
a. displays the sum of all even numbers between 2 and 100 (inclusive). b. displays the sum of all squares between 1 and 100 (inc
LuckyWell [14K]

Answer:

The program required is in the explanation segment.

Explanation:

Program :

import math

# a. displays the sum of all even numbers between 2 and 100 (inclusive).

print("All even numbers from 2 to 100 inclusive ")

sum=0

i=2

while i<=100:

if i %2 ==0:

sum=sum+i

print(i,end=" ")

i=i+1

print("\nThe sum of all even numbers between 2 and 100 (inclusive) :",sum);

#b. displays the sum of all squares between 1 and 100 (inclusive).

print("\nAll squares numbers from 1 to 100 inclusive:")

i=1

sum=0

while i<=100:

print(i*i,end=" ")

i=i+1

sum=sum+(i*i)

print("\n\nThe sum of all squares between 1 and 100 (inclusive) is :",sum)

#c. displays the powers of 2 from 1 up to 256.

print("\nAll powers of 2 from 2 ** 0 to 2 ** 8:")

i=0

while True:

p=math.pow(2,i)

if p>256:

break

print("2 ** ",i," is ",int(p))

i=i+1

#d. displays the sum of all odd numbers between a and b (inclusive), where a and b are inputs

print("\nCompute the sum of all odd integers between two intgers ")

a=int(input("Enter an integer:"))

b=int(input("Enter another integer: "))

count = 0

temp=a

sum=0

while a<=b:

if a%2!=0:

print(a,end=" ")

sum=sum+a

a=a+1

print("\nThe total of the odd numbers from ", temp ," to ", b ,"is",sum)

#e.displays the sum of all odd digits of an input. (For example, if the input is 32677, the sum would be 3 + 7 + 7 = 17.)

print("\nCompute the sum of the odd digits in an integer ")

n=int(input("Enter an integer:"))

count=0

sum=0

temp=n

while n!=0:

rem = n%10

if rem%2!=0:

sum=sum+rem

count=count+1

n=int(n/10)

print("Sum of the odd digits is ",sum)

print("The total of the odd digits in ",temp," is ",count)

4 0
3 years ago
A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
kondor19780726 [428]

The Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

<h3>The Network Mapper (Nmap) commands.</h3>

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

Read more on penetration test here: brainly.com/question/25813524

6 0
2 years ago
Name the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the
Artemon [7]

Answer:

Parity Bit

Explanation:

Given that Parity bit is a form of strategy or method that utilizes a scheme in adding a solitary bit to a binary string. This can be either 1 or 0, thereby making the total quantity of bit to become either odd parity bit or even parity bit during storage.

Hence, the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the number is called PARITY BIT.

7 0
3 years ago
Other questions:
  • HELLLLLP ill make you brainiest and ill give u a lot of points if you HELP ME Directions Part One.
    12·2 answers
  • Describe how to manipulate artwork in a presentation.
    13·1 answer
  • What is the first step to creating a PivotTable?
    11·1 answer
  • The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer sy
    14·1 answer
  • @anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
    11·2 answers
  • which of the following statements about matter is true a.matter is anything that occupies space and possesses mass b.matter can
    5·2 answers
  • Cite an early photographic pioneer or invention. Explain their/its impact on photography as we know it today.
    14·1 answer
  • Pls help will mark brainliest as soon as u awnser
    15·1 answer
  • What are 3 examples of a idler gear in real life?
    7·1 answer
  • What is bigger that terbites
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!