Answer:
c. traffic shaping
Explanation:
A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.
Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.
Answer:
D. 4x as much
Explanation:
The answer is pretty simple. The question is asking about 10m/s and 20m/s right? Take a look at the energy at each point on the graph. At 10m/s the kinetic energy is 100 on the graph. At 20m/s the kinetic energy is 400. You'll notice that 100 x 4 is 400 - That's the answer.
You can also prove this mathematically. The formula for kinetic energy is

The question says: constant mass so we can ignore that for now.
(1/2) * 10^2 is (1/2) * 100 = 50
for the 20m/s ball it would be
(1/2) * 20^2 = 400 * 1/2 = 200
Once again, you see that it is 4x
Answer: An Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network
Explanation:
Based on the information given, an Internet-routable IP address (static) of the customer gateway's external interface for the on-premises network need to be configured outside of the VPC for them to have a successful site-to-site VPN connection.
The Internet-routable IP address will be used in the identificatiob of each computer through the use of the Internet Protocol for the communication over a network.