1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
3 years ago
9

When a router forwards incoming packets closer to their destination hosts, this is called?

Computers and Technology
1 answer:
il63 [147K]3 years ago
3 0
Port forwarding, I think.
You might be interested in
Diffreciate between primary source of information and secondary source of information​
poizon [28]

Answer:

Primary is firsthand, secondary is viewed through articles and other materials.

Explanation:

EX: Primary account of a story, secondary view through pictures.

8 0
3 years ago
Identify a statement that accurately differentiates between short-term memory and working memory.
Veronika [31]

Answer:

Short term memory is in which a person may forgot very previously introduced knowledge, whereas working memory...well...works. Most people have working memory.

Explanation:

5 0
3 years ago
Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
ohaa [14]

Answer:

Information

Explanation:

Good decisions are normally based on facts which are tangible information that can be analysed to show trends of key figures such as sales, income, production that are so critical in business. A well-designed and accurate database captures and stores these figures in an organised way which will enable the information or data to be analysed to make informed decisions.

6 0
3 years ago
Globalization is based on <br>​
Blababa [14]

Answer:

the growing interdependence of the world's economies.

Explanation:

it's of all the cultures and populations that crossed the border by trading

5 0
3 years ago
A person who has a been exposed to technology at a young age is?
Dahasolnce [82]
Ok if lets say a young child at the age of like 6-7 was allowed to play grand theft auto by his/her parents maybe the child would understand incorrectly and start doing what the people do in the game this may cause to serious trouble jail time or even death. In this case dont let your kids play underrated games or watch underrated movies.
Hope that helped you understand more.
7 0
4 years ago
Other questions:
  • What types of data are commonly entered into a cell ?
    7·2 answers
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • Create a cell array, called A, with the following contents: a. Make a copy of A called B. (Nothing complicated: B = A is suffici
    10·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • In a meeting, Juan hears someone say a product mix is "wide." What does
    13·1 answer
  • A computer byte is the amount of data (measured in bits) that CPU can manipulate at one time/
    8·1 answer
  • Learning Task 3: Write the safety requirement indicated in each number on a
    15·1 answer
  • Edhesive assignment 1 movie ratings
    9·1 answer
  • Discuss how a lack of infrastructure in poor communities could contribute to ill-health such as the Unrest looting.​
    9·1 answer
  • You want to send an email to members of your team working on a school project. In which field would you put the email addresses
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!