Answer:
b. they are located at the intersections of the network of wires and cables that make up the internet.
Explanation:
Given that Router is a computer networking device that operates by transferring data packets between computer networks, while also ensuring traffic organizing tasks on the Internet.
Hence, Routers put packets in the right order after they arrive at their destination by matching the destination IP address of the packet and one of the addresses in the routing table.
Also, Routers check the address on each packet that arrives and decide which way it should go next by ensuring the data packets are summarized for the outgoing interface recorded in the table entry.
Therefore, the correct answer is option B
Answer:
Major risks include computer security and maintability of the software and hardware components of the computers in these objects.
I may feel more scared if I was riding a roller coaster that was computer controlled because if there were vunerabilities in the computer's software, a hacker could exploit that and remotely have access to the controls of the roller coaster, putting many people's lives at risk.
I think the benefits of computerizing an increasing number of everyday objects outweigh the potential risks.
This is because computers is very reliable and they do exactly what you tell them to do. However, humans are clumsy and can sometimes be extremely stubborn. Computerizing more everyday objects is an overall good thing for society, however, policies and protocols need to be followed to ensure these computerized objects remain secure.
Explanation:
Hope this helps.
NTFS quotas
File server resource manager.
A system admin has rights to set NTFS quotas if he or she is
concerned with some users monopolizing a small amount of disk space. Activating
NTFS quotas helps set a storage limit for users using a particular volume. Out
of the two, file server resource manager is the most effective and flexible. It
is best recommended to use file server resource manager if you need quotas. It
comes with file-type filtering and includes folder-level quotas.
Answer:
c. traffic shaping
Explanation:
A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.
Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.