1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
8

What piece of hardware directs traffic between the connected devices when two LAN's are communicating across the Internet?

Computers and Technology
1 answer:
luda_lava [24]3 years ago
3 0

Answer:

The correct answer is "Router".

Explanation:

In networking, routers is one of the main hardware which is used to direct the data traffic on a LAN system.

The router also works as an interconnection system for two or more than two networks. Routers mostly work between the internet and computer which directs the data to its right path.

It works between the computer system in a premise to make the networking possible through a LAN by using switches for communication between two or more than two devices in a LAN across the internet.

Hence, the most appropriate answer is the router.

You might be interested in
Irma bought a gaming computer at Bestbuy 3 years ago and it’s been on ever since. Her computer is staring to feel unstable and a
Zanzabum

Answer:

Explanation:

Never turning off a computer leads to the components, such as RAM and CPU, never getting a chance to cool down. When they are put under continuous stress, their lifespan starts to diminish. Thus it would be best to shut the computer down when not in use.

Another issue would never be giving the computer a chance to restart to install updates. Patches for security flaws can put the computer at risk. Thus it would be best to let the computer update via downloading them and restarting so that the computer can patch system files and security vulnerabilities.

The last issue is that, due to its continued and extensive use, Irma has likely done a lot of browsing and gaming. Downloading may have led her to accidentally infect her system. The computer could be dealing with viruses that the built-in system antivirus cannot catch. So, if Irma were to use a high quality third-party antivirus, it can catch some Trojans or data miners that could be affecting her computer.

3 0
3 years ago
Pressing the Ctrl+Home keys moves the insertion point to the
mrs_skeptik [129]
For the answer to the question above asking that by <span>Pressing the Ctrl+Home keys moves the insertion point to the?</span>
The answer is A. beginning of a document. 
I assume you are talking about Microsoft Excel 2007 version?
Because it isn't indicated on the question
5 0
3 years ago
Read 2 more answers
What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
timofeeve [1]

Answer:

One of the most widely cited information security certifications is the Certified Information Systems Security Professional (CISSP), offered by the International Information Systems Security Certification Consortium (ISC)2[1].

4 0
2 years ago
When converting the relationships to the relational model and the database schema, it is possible that some of the relationships
klemol [59]

Answer:

b mwcvhgdvgcvyjac hgscvghsdv

Explanation:

8 0
3 years ago
What is computer software
Butoxors [25]
A set of instructions and documents that tells a computer what to do or how to perform a task or it can mean all the software on a computer,
7 0
3 years ago
Read 2 more answers
Other questions:
  • An operating system cannot run from an external drive. true or false
    15·1 answer
  • How does a 3D CAD solid model program display the progression of work involved in creating a model?
    5·1 answer
  • Which is an example of a tertiary source?
    13·1 answer
  • Emilio is reviewing the data he collected from historical records about immigration in the united states. He decides to create a
    5·1 answer
  • As an IT tech for your company, you have been notified that the Windows domain does not seem to be functioning properly. Being f
    7·1 answer
  • What is the education level of a majority of the Power, Structural, and Technical Systems workers?
    7·1 answer
  • How to do a linear equations
    8·1 answer
  • Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol
    7·1 answer
  • What is the maximum number of characters you can have in a file name​
    8·1 answer
  • 1. Using a microphone to create an audio file to accompany a message is an example of how data is processed and sent to an outpu
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!