1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
9

1. Which of the following statements are true about routers and routing on the Internet. Choose two answers. A. Protocols ensure

that a single path between two computers is established before sending packets over it. B. Routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. C. A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped". D. Routers act independently and route packets as they see fit.
Computers and Technology
2 answers:
astra-53 [7]3 years ago
4 0
Not A - Internet is packet-switched, not circuit-switched. The packets might follow different paths.
Not B - The routers communicate with each other to determine the path.

C correct - The Internet Protocol or IP used by routers to send packets makes no guarantee that they will be delivered. It uses best-effort delivery.

Not D - See answer B above.
dybincka [34]3 years ago
3 0

Answer:

C. A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped".

D. Routers act independently and route packets as they see fit.

You might be interested in
Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should
Elenna [48]

Answer:

C. Grant Access Using Hierarchy sharing setting on the Job Object set to false.

A. "Modify All" permission for Job Object on the Delivery Profile.

E. Organization-Wide Default sharing setting of Private on the Job Object.

Explanation:

In this example, we are dealing with sensitive information. We learn that because of this, the only users who should be able to view and edit job records are the user who owns the record and all users in the delivery profile. In order to protect the information, it is necessary to have an organization-wide default sharing setting of private. After this, we also need the "modify all" permission for job object on the delivery profile and the Grant Access Using Hierarchy sharing setting to be set to false.

7 0
3 years ago
A​ _______ helps us understand the nature of the distribution of a data set.
Sphinxa [80]

Frequency distribution
3 0
3 years ago
Software that people commonly use in the workplace to make their lives easier is called
Lorico [155]
Software that people commonly use in the workplace to make their lives easier is called system software.
4 0
3 years ago
Como hago para poner brainly en español???
Lelu [443]
Mentely es eso espero q te ayude :)
4 0
3 years ago
Read 2 more answers
Using Gen/Spec, classes can be organized by using a peer-to-peer inheritanc True/false
Fiesta28 [93]

Answer: True

Explanation: Gen/Spec is the known as the general specification standard for the classes.This standard helps in bringing out the peer-to-peer relations of class.

Gen/Spec is used in class diagram because it helps in the display of the access sharing and class specification in the general form for the required instances.Thus, this standard helps in the enhancement of the class diagram and its inheritance. So, the statement given in the question is true.

5 0
3 years ago
Other questions:
  • Is Apple a consumer or luxury brand? Give examples.
    10·1 answer
  • 5. What would the browser display if the following code were executed in a script?a var product = 0; while ( product <= 25 );
    8·1 answer
  • A _________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged
    5·1 answer
  • All of the following are vertical alignment options except __middle , top, center, or_bottom_.
    12·1 answer
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • Suppose you want to boot a VM from its virtual DVD drive, but it boots to the VM’s hard drive. Which of the following could be t
    12·1 answer
  • RTOS stands for ______ Time Operating System.
    11·1 answer
  • 9.19 LAB: Words in a range (lists) Write a program that first reads in the name of an input file, followed by two strings repres
    6·1 answer
  • Subscribe to my you tube channel to get all your questions answered
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!