1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
13

What is the difference between edge and core networks?

Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
6 0

Answer and Explanation:

Difference between core network and edge network:

  • Core network is also known as the backbone network whereas edge network stands for enhanced data rate for global evolution
  • Core network provides the path for exchanging the information between different sub networks,whereas edge network provide information exchange between excess network and core network

You might be interested in
Somehow I lost 1000 points!!! Does anyone know what happened? Is it possible that I was hacked? ​
Dima020 [189]

Answer:

Explanation:

You most likely lost 1000 points because you cheated to get them if not there is a possibility you were.

6 0
3 years ago
Read 2 more answers
What is the function of a bread crumb trial in a website
joja [24]

Answer:

A “breadcrumb” (or “breadcrumb trail”) is a type of secondary navigation scheme that reveals the user's location in a website or Web application. The term comes from the Hansel and Gretel fairy tale in which the two title children drop breadcrumbs to form a trail back to their home.

Explanation:

A breadcrumb or breadcrumb trail is a graphical control element frequently used as a navigational aid in user interfaces and on web pages. It allows users to keep track and maintain awareness of their locations within programs, documents, or websites. Breadcrumbs make it easier for users to navigate a website – and they encourage users to browse other sections of the site. ... You head to their site and end up on The Nestle company history page. Using their breadcrumbs, you can easily navigate back to About Us, History, or even their home page.

6 0
3 years ago
This information is stored in every IP packet to make sure that the packet is eventually discarded if it cannot find the address
Andreas93 [3]

Answer:

TTL

Explanation:

TTL means time -to- live field is a counter that is designed to keep packets from circulating indefinitely in the network case forwarding tables accidentally create cycles. An IP datagram is typically initialized with a TTL of 60 or 64 and the TTL is decremented by one each time it enters a router. If the TTL reaches zero, the router will discard the packet. It is one of the components of the IP datagram

6 0
3 years ago
Q4. Write down the JavaScript statements to perform the following tasks.
goldenfox [79]

Answer:

Explanation:

In Javascript, you can accept an input value by using the prompt() function and saving the input into a variable. In the following lines of code, I have declared the three variables at the beginning and then prompted the user to enter a value for each and saved the values in the correct variables. In Javascript length is a keyword so I used len instead.

let base, height, len;

base = prompt("Enter Base value: ");

height = prompt("Enter Height value: ");

len = prompt("Enter Length value: ");

5 0
3 years ago
Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was
hichkok12 [17]

WWW/ World Wide Web.

7 0
3 years ago
Other questions:
  • A keyboard and touch screen are the most common of ________ devices. select one:
    11·1 answer
  • Find the reciprocal of 7/2 × 3/5<br>​
    6·1 answer
  • Sami is creating a web page for her dog walking business. Which item will set the theme for her page? Background color Heading c
    9·1 answer
  • For large and complex amounts of information, storing the information is best achieved by using what?
    5·1 answer
  • 7) Which of the following factors determines the structure, features, and functions of an information system used in a company?
    7·1 answer
  • For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this
    10·1 answer
  • Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?
    9·2 answers
  • (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
    14·1 answer
  • Mary can view the thumbnails of her presentation slides when she’s creating the slides which element of the programs interface i
    8·1 answer
  • If you are worried that team members will not keep sensitive information private, you could ask them to sign a ________ agreemen
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!