1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Talja [164]
3 years ago
14

True or false: when an ospf route sends its link state information, it is sent only to those nodes directly attached neighbors.

explain.
Computers and Technology
1 answer:
Korvikt [17]3 years ago
4 0

Answer:

The following statement is True.

Explanation:

LSU(Link State Update) is also known as the Link State Acknowledgements.  

Link State Update packets are use for flooding of the Link State Acknowledgements and sending Link State Acknowledgement response to the Link State Request packets.  

It sent directly connected neighbors who previously requested the Link State Acknowledgements in form of the Link State Request packets.  

In the case of the flooding, neighbors routers are only responsible for the re-encapsulation of the received Link State Acknowledgement informations in the new Link State Update packets.

You might be interested in
When leased computing resources can be increased or decreased​ dynamically, they are said to be​ ________.
damaskus [11]

<u>Answer:</u>

When leased computing resources can be increased or decreased dynamically, they are said to be Elastic resources.  

<u>Explanation</u>:

Elastic resources are the resources that are leased and they can be increased or decreased based on the number of users that are using the resource simultaneously. Popular example for elastic resource is Elastic Search EC2, where 2 to 4 servers are allocated to handle the service requests dynamically depending upon the usage. Cloud computing businesses  like Google and AWS Cloud depends on elastic resources.

4 0
3 years ago
Read 2 more answers
Computer simulations can: A. accurately predict the weather a month in advance.
loris [4]
I believe the answer is A but i am not too sure :/
7 0
4 years ago
Escribe todas las posibles combinaciones que pueden haber entre 4 bits.
Vedmedyk [2.9K]

Answer:

The answer is "\bold{2^n\ \  _{where} \ \ \ n \ is\ bit }"

Explanation:

The Combinations could be produced by using n-bits 2^n . It s enables you to generate the 4-bit numbers that are:

\to  2^4 = 16 combinations.

for the 4-bit, the combination of 2 = 16, which are its possible combination and for the   10 variations  appropriate 16 combinations are used,  As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.

7 0
3 years ago
You want to display the process of raising a scholarship request and its approval on a slide. Which element in the presentation
mario62 [17]

The answer is actually a flowchart, since flowcharts are used to show processes. The person who said it's a table is wrong, I just took this test on Plato and got a 5/5.

4 0
4 years ago
PLZ HELP 100 points!!!! 1. Imagine you are a screenplay writer. Discuss some possible activities or techniques you
atroni [7]

Answer:

One angle

Explanation:

I have seen several scripts with various directions such as "Close on" "from another angle", etc. And other scripts without such notations. I have seen conflicting comments concerning this practice---Some producers I have contacted say they want this IN the "finished script" they get and others, feel, like I do, that camera angles and lighting and such are up to the director in the production phase. I have also read that Spec Scripts do not have such notations. So what should I include or not, in this respect, in a Spec Script.

5 0
4 years ago
Other questions:
  • You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w
    7·2 answers
  • A program is a high-level one that has been converted to machine language
    15·1 answer
  • Which vendor certification would you think is the most relevant in the field of IT security? Why?
    7·1 answer
  • List the six external peripheral parts of a computer system
    8·1 answer
  • Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
    6·1 answer
  • Which two tasks are associated with router hardening? (choose two.)?
    6·1 answer
  • What tool can help discover and report computer errors when you first turn on a computer and before the operating system is laun
    9·2 answers
  • How can a cell phone tower help people​
    11·2 answers
  • Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHIN
    7·1 answer
  • A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!