1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
9

1. Which of the following statements are true about routers and routing on the Internet. Choose two answers. A. Protocols ensure

that a single path between two computers is established before sending packets over it. B. Routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. C. A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped". D. Routers act independently and route packets as they see fit.
Computers and Technology
2 answers:
astra-53 [7]3 years ago
4 0
Not A - Internet is packet-switched, not circuit-switched. The packets might follow different paths.
Not B - The routers communicate with each other to determine the path.

C correct - The Internet Protocol or IP used by routers to send packets makes no guarantee that they will be delivered. It uses best-effort delivery.

Not D - See answer B above.
dybincka [34]3 years ago
3 0

Answer:

C. A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped".

D. Routers act independently and route packets as they see fit.

You might be interested in
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Offering 20 points for this iCloud related question!
Bezzdna [24]
1. Factory Reset
2. Jailbreak
3. To delete iCloud you need to turn of find my iphone
8 0
3 years ago
Select the correct answer.
hammer [34]

Answer:

B :)

Explanation:

C and D could work, but B is the most logical.

Hope it helps! :)

If I'm right, I would really appreciate it if you could vote me as the Brainliest answer. Thank you!

7 0
3 years ago
Read 2 more answers
One way to make a data table stand out on the screen and help bring the viewer’s attention to it is to add a shadow behind the t
olganol [36]
A user can add a shadow to a table on Power Point presentation, b<span>y choosing the Layout tab under Table Tools, clicking on Effects, and selecting Shadow. The shadow can be inner, outer or perspective. The most commonly used is outer shadow.
</span>Adding a shadow behind the table will make the <span>data table to stand out on the screen and help bring the viewer’s attention.
Shades can be added also on text, tables, pictures inserted in the presentation and other object. </span>
7 0
3 years ago
Read 2 more answers
What is income?
s2008m [1.1K]
I think its D hope this help
5 0
4 years ago
Read 2 more answers
Other questions:
  • What is the slide sorter view used for?
    11·1 answer
  • Which of these is NOT a cloud-based system?
    10·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    7·2 answers
  • For what reasons do readers use text-to-speech tools? Check all that apply.
    8·2 answers
  • Adjectives to describe programming skills
    12·1 answer
  • OMG 2 TIMES ;DDDDDDDDDDDDDDDDD​
    14·1 answer
  • Definition of Computer forensics?
    12·2 answers
  • Explain the application software and utility software in detail​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!