1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mazyrski [523]
3 years ago
13

1. It is a requirement to install a routing protocol that monitors the network for routers that have changed their link state. T

he __________ protocol provides the ability to accomplish this.
2. The __________ is a protocol that bases routing decisions on the network path and rules.
3. RIPv2 needs to be installed to enable dynamic routing. This should be installed in the __________ snap-in.
4. A customer requires a high-speed packet switching alternative to X.25. __________ should be installed.
5. X.25 connections utilize a clocking circuit. This makes them __________.
6. While analyzing Frame Relay frames, it is found that a message consisting of 10 separate packets was sent over five different circuits. These five circuits together form a __________ circuit.
7. A company just purchased a leased line that runs the Frame Relay service. The standard data rate for this service is known as __________.
8. A client wants to upgrade her remote users from dial-up to a faster service. However, cable Internet and DSL are not available in their respective areas. Another valid alternative is to use __________.
9. A customer wants a WAN technology that does not use variable-length packets but instead uses fixed-length cells. __________ is the recommended solution.
10. A client with eight computers needs a cost-effective Internet solution that can transmit 128 Kbps. __________ is the recommended solution.
Computers and Technology
1 answer:
Nady [450]3 years ago
8 0

Answer:

1. Open Shortest Path First (OSPF)

2. Border Gateway Protocol (BGP)

3. Routing and Remote Access Service (RRAS)

4. Frame relay

5. Synchronous

6. Virtual

7. Committed Information Rate (CIR)

8. Integrated Services Digital Network (ISDN)

9. Asynchronous Transfer Mode (ATM)

10. Basic Rate Interface (BRI).

You might be interested in
When it's time to change career paths, it's a good idea to first​
yarga [219]

Answer:

Go for an interview before quitting your job.

Explanation:

You don't want to lose your job, do you? :)

8 0
3 years ago
Read 2 more answers
#Write a function called find_median. find_median #should take as input a string representing a filename. #The file correspondin
azamat

Answer:

Explanation:

The following is written in Python. It takes in a file, it then reads all of the elements in the file and adds them to a list called myList. Then it sorts the list and uses the elements in that list to calculate the median. Once the median is calculated it returns it to the user. The code has been tested and the output can be seen in the image below.

def find_median(file):

   file = open(file, 'r')

   mylist = []

   for number in file:

       mylist.append(int(number))

   numOfElements = len(mylist)

   mylist.sort()

   print(mylist)

   if numOfElements % 2 == 0:

       m1 = numOfElements / 2

       m2 = (numOfElements / 2) + 1

       m1 = int(m1) - 1

       m2 = int(m2) - 1

       median = (mylist[m1] + mylist[m2]) / 2

   else:

       m = (numOfElements + 1) / 2

       m = int(m) - 1

       median = mylist[m]

   return median

print("Median: " + str(find_median('file1.txt')))

5 0
3 years ago
The automotive system that connects the engine and the transmission to the wheels is called the
notsponge [240]
The automotive system that connects the engine and the transmission to the wheels is c (c) the steering system
5 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
Python Code that predicts the amount of money you will have in your IRA when you retire. Inputs are: 1. Number of years until yo
zaharov [31]

Answer:

yearsUntilRetire =0

expectedInterest =-1.00

initialAmount =-1.0

expectedAmountToAdd = -1.00

while yearsUntilRetire < 1 or yearsUntilRetire > 70:

yearsUntilRetire = int(input("Number of year until you retire between 1 to 70: "))

while expectedInterest <0 :

expectedInterest = float(input("enter the expected rate : "))

if expectedInterest >= 10:

doubleCheckRate = input("do you really expect {} interest rate: ".format(expectedInterest)).lower()

if doubleCheckRate == "false":

expectedInterest =-1.00

while initialAmount < 0:

initialAmount = float(input("Enter positive initial amount for IRA: "))

while expectedAmountToAdd < 0 or expectedAmountToAdd > 2500:

expectedAmountToAdd = float(input("Enter positive IRA amount to be added each year between 0 to $2500: "))

finalContribution =initialAmount

for i in range(yearsUntilRetire):

finalContribution = finalContribution + finalContribution * (expectedInterest/100.00) + expectedAmountToAdd

if (i+1) % 5 == 0:

print("Contribution after year {} is ${:,.2f}.".format(i+1,finalContribution))

 

print("Final Contribution is ${:,.2f}.".format(finalContribution))

Explanation:

  • Use a loop to get the valid input from the user for years until retire between 1 to 70 .
  • Get the valid input for expected rate .
  • Check if expected rate is greater than or equal to 10 then ask the user again if one expect such high rate .
  • Use a loop to get valid IRA initial Contribution .
  • Use a loop to get expected Amount to add regularly in IRA .
  • Iterate over numbers of year and print the data after 5 years .
3 0
3 years ago
Other questions:
  • Which result would support the particle theory of light?
    6·2 answers
  • Peter works on a huge database of numerical figures in a worksheet ranging from cell A1 to cell I50. He has to print the workshe
    10·2 answers
  • Simpson is trying to solve an equation related to converting a decimal number to its hexadecimal form. He decides to utilize the
    6·1 answer
  • In which of the following scenarios would you use the Redo function?
    9·1 answer
  • What is a GUI?
    11·1 answer
  • What are some direct access devices
    15·1 answer
  • What term is commonly used to refer to HTML formatting?
    5·1 answer
  • Does anyone know what episode Hinata threatens useless sakura?
    9·1 answer
  • ________ software consists of operating systems, utilities, device drivers, and language translators.
    7·1 answer
  • What is Cloud computing? Explain briefly
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!