1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
10

Which of the following is a Layer 3 protocol designed to permit routers to exchange information about networks that are reachabl

e, the routes by which they may be reached, and the costs associated with such routes?
a. Routing protocol
b. Redistributed protocol
c. Maximum protocol
d. All of the above
Computers and Technology
2 answers:
Nikolay [14]3 years ago
5 0

Answer:

a. Routing protocol

Explanation

Routing protocol is a layer 3 (Network layer) protocol used by routers to exchange information about available routes , their associated costs and delays.

77julia77 [94]3 years ago
3 0

Answer:

A

Explanation:

Routing protocol A routing protocol specifies how routers communicate with oneanother, information that enables them to select routes between any two nodes on a computer network.

You might be interested in
Can someone please help me with this question?
madreJ [45]
I would use a biometric machine that scans a fingerprint and a eye retina then calls up my bank information from the scan. Who wants to carry a card around anyway?
5 0
3 years ago
A ________ algorithm is a method of locating a specific item of information in a larger collection of data.
pav-90 [236]
A .) Sort

more ... To arrange or group in a special way (such as by size, type or alphabetically).
6 0
3 years ago
How would this requirement be implemented?
Svet_ta [14]

Answer:

B. Using a Rate Rule in the Community Manager

Explanation:

Rate rules are techniques to protect your community from spammers and web bots that attack or spam your community by posting the similar message several times in a row. You can build rate rules to alert your community moderators of suspicious spammer-like activities in your community or freeze a member on the spot.

Take for example, when the universal shipping introduces a rate rule to their comunity, Community Moderators will now be alerted when a member post more than one file to the community within a 15-minute window thereby making them frooze the account accordingly.

6 0
3 years ago
ISDN stands for Internet Services Dynamic Network True/False
aev [14]

The answer is the second option "false." ISDN does not stand for Internet Services Dynamic Network it stands for Integrated Services Digital Network. ISDN is the international communication center for sending data, video, and voice over telephone wires.

Hope this helps.

7 0
3 years ago
________ is the process of inspecting data that has been input to a program to make sure it is valid before using it in a comput
Mumz [18]

Answer:

Hence, <u>Input Validation</u> is the process of inspecting data that has been input to a program to make sure it is valid before using it in a computation.

Explanation:

The input should be validated before further processing to avoid problems in execution of program afterwards.

The process of input validation is defined to make sure that the input is valid.

Hence, <u>Input Validation</u> is the process of inspecting data that has been input to a program to make sure it is valid before using it in a computation ..

3 0
3 years ago
Other questions:
  • Henry bought a new card for capturing television on his computer. When he finished going through the packaging, though, he found
    5·1 answer
  • Which of these forms of multimedia would most likely contain both music and text:
    14·1 answer
  • According to company policy and administrator must logically keep the Human Resources department separated from the Accounting d
    5·1 answer
  • The instructions in the language of alice are contained on ____ which you can drag and drop into place to ____ new programs
    8·1 answer
  • Write out the base sequence that is added directly after the primer. In order for Moodle to correctly grade this question, write
    11·1 answer
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    7·2 answers
  • To reduce the potential for repetitive stress injury you should use proper?
    6·1 answer
  • you manage a network that has multiple internal subnets. you connect a workstation to the 192.168.1.0/24 subnet. this workstatio
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!