1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
8

What type of function is being performed when a router screens packets based on information in the packet header

Computers and Technology
1 answer:
Helga [31]3 years ago
3 0

Answer:

"Router screening" is the correct option.

Explanation:

  • A router that philters packets like a firewall. For certain instances, the whole firewall system is such a single scanning router.
  • Often connected to a network stage as well as a container-filter firewall has been the scanning router firewall. This rather firewall operates by filtering protocol characteristics from received packets.

So that the above seems to be the correct approach.

You might be interested in
alex needs to email his graduation certificate to a prospective employer. he has only physical copies of the certificate. what d
svlad2 [7]
He should use a scanner, which would convert an image into an electronic file.
7 0
2 years ago
There are a number of types of digital memory available, such as hard disk drive (HDD), random access memory (RAM), solid state
elena55 [62]

Answer and Explanation:

In my view, there is no benefit to having several types of digital storage, but it would be helpful when there is only single SSD format of different sizes, therefore it would be very convenient for an individual to select storage memory and doesn't get frustrated although several choices contribute to uncertainty about what to purchase rather than what is better for the machine. So, only a single centralized memory and the only one that is deemed perfect for your device so far.

(a)...Yeah, then it'll be easier and even more efficient for individuals to have a single standard because there'd be only that standard and then no more ambiguity, although it is quicker or lighter and would have been sufficient to send.

(b)...No, I wouldn't be using the very same piece of hardware if I were considering multiple processing categories because I would require memory interface types for various functions, so those won't all require the very same memory, however, I would like various storage of various sizes and I'm using memory interface categories effectively.

6 0
3 years ago
The Double.parseDouble() method requires a String argument, but it fails if the String cannot be converted to a floating-point n
Andrei [34K]

Answer:

  1. import java.util.Scanner;
  2. public class Main {
  3.    public static void main(String[] args) {
  4.        Scanner input = new Scanner(System.in);
  5.        String numStr = input.nextLine();
  6.        double num;
  7.        try{
  8.            num = Double.parseDouble(numStr);
  9.        }
  10.        catch(NumberFormatException e){
  11.            num = 0;
  12.            System.out.println("Value entered cannot be converted to a floating point number.");
  13.        }
  14.    }
  15. }

Explanation:

The solution code is written in Java.

Firstly, we create a Scanner object and prompt user to input a number (Line 5-6). Next, we create a try -catch block and place the parseDouble inside the try block. If the input is invalid (e.g. "abc"), a NumberFormatException error will be thrown and captured and set the num to 0 and display the error message (Line 11 - 13).  

3 0
2 years ago
A particularly devastating type of dos attack is the ____ dos attack, in which multiple unsuspecting computers are used to attac
IgorLugansk [536]
Distributed






---------------------
3 0
3 years ago
Why are some geo satellites not usually used for transmitting tcp/ip information?
charle [14.2K]
TCP has flow control, which means a two-way connection must be present. Satellites are sometimes optimized for broadcasts, which is unidirectional (ie., sending, not receiving).
6 0
3 years ago
Other questions:
  • What benefit does internet have​
    11·1 answer
  • Complete the paragraph to explain how Angelina can notify readers that her report is just a draft.
    6·1 answer
  • What may happen if a large number of computer users are attempting to access a web site at the same time that you are?
    14·1 answer
  • You are a website designer for a travel website. You have to design an enchanting website. The website should be interactive. Me
    8·1 answer
  • Please explain why an operating system makes a great attack target.​
    9·1 answer
  • What are lexical errors?<br> and fi(a==b)<br> will it be a lexical error or a syntactical error?
    8·1 answer
  • A part-time job performed while in high school must have the approval of your school counselor.
    7·2 answers
  • The valid call to the function installApplication is
    5·1 answer
  • which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
    11·1 answer
  • List 2 negative impacts of cybersecurity.<br><br><br><br>Answer and I will give you brainiliest ​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!