1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
3 years ago
14

Describe the relative benefits of routing over a broadcast style of communication. Is routed traffic more secure than broadcasti

ng? Justify your answer.
Computers and Technology
1 answer:
iren2701 [21]3 years ago
8 0

Routing is process of selecting and establishing the routes that data packets take on their way to a particular destination (specific IP addresses). Broadcasting on the other hand is the simultaneous transmission of the same message to multiple recipients. In contrast to routing, broadcasting lacks the ability to direct packets to a specific address. When it comes to security, routing is not necessarily more secure than broadcasting. Without goof security protocols other users can read messages even if they aren't the recipient of the packet.

You might be interested in
What are an administrator's choices for managing file permissions on a drive formatted as fat32?
Alexeev081 [22]
<span>If the drive is a network share, then Share permissions can be used.</span>
6 0
4 years ago
Select all statements below that are TRUE for For...Next loops. A. It is used for a fixed number of iterations. B. It is used fo
sasho [114]

Answer:

A and C

Explanation:

The for next loop is used for a fixed number of iterations which is usually indicated in the syntax. It uses a counter that increments on each iteration. The loop terminates when the counter reaches the number of initially specified iterations. It is different from a while loop which depends on a specified condition evaluating to the Boolean 'true'.

7 0
3 years ago
During the boot process, the computer performs a quick self diagnostic then loads the operating system into memory.... IS THIS T
zlopas [31]
<span>The answer is False.  During the boot process, the computer will perform a self-diagnostic, also known as a POST and load necessary drivers and programs that help the computer and devices communicate.</span>
7 0
3 years ago
If you have cable internet service, what protocol is used between the head end connection and the cable company's network
julsineya [31]
The answer would be (DOCSIS). :)

Have a blessed day and hope this helps!
7 0
3 years ago
What is internal storage device
Assoli18 [71]
Something like a hard drive.
5 0
3 years ago
Other questions:
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    7·1 answer
  • All of the following are examples of a web application except for ______.
    12·2 answers
  • Somebody who is good at this stuff, please halp meh ;-;
    6·1 answer
  • _____ are independent and not associated with the marketing efforts of any particular company or brand.​
    9·1 answer
  • (01.03 LC)
    9·1 answer
  • A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
    14·1 answer
  • Assume the availability of a function named oneMore. This function receives an integer and returns one more than its parameter.
    14·1 answer
  • In a finite state machine, state transitions happen only: a. When the reset causes a clock pulse on the D outputs of the flip-fl
    11·1 answer
  • 7.2 code practice edhesive. I need help!!
    13·1 answer
  • Ups developed software called ____ to enable u.s. customs and border protection agents to inspect packages that pass through the
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!