1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
10

) A stub network has ______. (Points : 2) one backup route

Computers and Technology
1 answer:
jeyben [28]3 years ago
6 0

Answer: One backup router

Explanation:

 A stub network is the type of the packet network that basically describe the computer notwork. It typically capable for sending the complex data in the single network path when the network aware about its destination.

A stub network contain the one backup router as the stub routing is the typically designed for conserve the resources of the local router like the central processing unit (CPU) and the memory. It basically improve the stability of the network in the system.

You might be interested in
How do we explain the difference between fake news and facts​
Natalija [7]

Answer: it depends if the news is on the news and someone rights an article about it and says some mislead details that's how u know its fake  

Explanation:

3 0
3 years ago
Design a class named QuadraticEquation for a quadratic equation ax^2+bx+x=0. The class contains: **private data fields a, b, and
LenaWriter [7]

Answer:

<em>C++</em>

///////////////////////////////////////////////////////////////////////////////////////////

#include <iostream>

using namespace std;

//////////////////////////////////////////////////////////////////

class QuadraticEquation {

   int a, b, c;

   

public:

   QuadraticEquation(int a, int b, int c) {

       this->a = a;

       this->b = b;

       this->c = c;

   }

   ////////////////////////////////////////

   int getA() {

       return a;

   }

   

   int getB() {

       return b;

   }

   

   int getC() {

       return c;

   }

   ////////////////////////////////////////

   // returns the discriminant, which is b2-4ac

   int getDiscriminant() {

       return (b*2)-(4*a*c);

   }

   

   int getRoot1() {

       if (getDiscriminant() < 0)

           return 0;

       else {

           // Please specify how to calculate the two roots.

           return 1;

       }

   }

   

   int getRoot2() {

       if (getDiscriminant() < 0)

           return 0;

       else {

           // Please specify how to calculate the two roots.

           return -1;

       }

   }

};

//////////////////////////////////////////////////////////////////

int main() {

   return 0;

}

4 0
4 years ago
Nj hj hjkbh hj g7yubuyiycrtdryfrrcctcftt
Dafna1 [17]

Answer:

nice letters

Explanation:

6 0
3 years ago
Read 2 more answers
Which of these lights is NOT part of the standard three-point lighting setup?
Contact [7]

Answer:

i believe background lighting

8 0
3 years ago
Write a JAVA program containing a method called hasEight(), which takes an int as input and returns true if the number contains
skelet666 [1.2K]

Here's my code for that, consider it under the WTFPL (http://www.wtfpl.net/). Here is a pastebin of the code, as to avoid text formatting. (Link: https://pastebin.com/S3BDGxqm Raw: https://pastebin.com/raw/S3BDGxqm)

package javaapplication6;

import java.util.Scanner;

public class JavaApplication6 {

   

   public static void main(String[] args) {

       

       Scanner myScanner = new Scanner(System.in);

       

       boolean a;

       int s;

       System.out.println("Enter an int");

       s = myScanner.nextInt();

       a = hasEight(s);

       System.out.println(a);

       

   }

   private static boolean hasEight(int s)

   {

       String str = String.valueOf(s);

       return str.contains("8");

   }

   

}

7 0
4 years ago
Other questions:
  • Brenda wants to finish her presentation with a summary slide . She wants three key messages to appear on each of the photo clips
    6·2 answers
  • The following is true about SPAM ________.
    9·1 answer
  • Customers access the internet through what usually for a monthly fee
    14·1 answer
  • Explain three applications of data mining
    14·1 answer
  • Which of the following TCP/IP settings should be configured to specify DNS suffixes to use other than resolving names through a
    9·1 answer
  • What is thought to have caused the extinction of the dinosaurs?
    13·1 answer
  • If the algorithm does not have instructions for unanticipated results, the computer program will
    15·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • Please its argent and I will give you BRAINLIEST ANSWER 6. How would you confirm that a colourless liquid given to you is pure w
    10·1 answer
  • What happened to China and India after they modernized their workforces by providing more training and education?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!