1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igor_vitrenko [27]
3 years ago
10

What is the job of a router during the process of routing on the Internet?

Computers and Technology
1 answer:
geniusboy [140]3 years ago
4 0

Answer:

Choice C

Explanation:

You might be interested in
Which of the following configuration files would you document
Nikolay [14]

Answer: B.you have modified a configuration file to mount these new file system automatically

Explanation:

Hope this helped...~DASH

4 0
3 years ago
Which of the following are considered transactions in an information system?
Marrrta [24]

Answer: (C) All of them.

Explanation:

 All the given options are example of the transaction in the information system.

As, the money deposited in the bank account is the process that take place computerized for transaction purpose. Now a days we can easily done transaction through wire transfer at anywhere and anytime by using the information system technology.  

Students can easily study online and also record their answers in the online test by using the information system technology.  

Customers can also doing shopping online by adding various products and items in the online shopping cart by using various e-commerce websites like amazon, flip-cart etc.  

5 0
3 years ago
A user input is when the user interacts with the program by typing.<br> True<br> False
Yuri [45]
The answer is true I think
6 0
3 years ago
Read 2 more answers
2) A language that changes code to machine-readable code one command at a time is known as what
iogann1982 [59]

Answer:

2) Interpreted programming languages (e.g. Python, Perl)

3) In computer science, the syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions in that language. That means that the each programing language has its own specific rules.

4) Pseudocode

5) Cryptographic coding, examples: The Caesar shift, Kryptos

5 0
3 years ago
How many pages is 2000 words double spaced 12 font.
Anna007 [38]

Answer: 8 pages

Explanation:

4 0
2 years ago
Other questions:
  • Which of the encryption standards listed offers the greatest amount of security? A. WPA2 B. WEP2 C. WPA D. WEP
    5·1 answer
  • In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
    13·1 answer
  • The part of the inside of a computer
    14·1 answer
  • 100 students were asked to fill out a form with three survey questions, as follows: H: Honor Roll C: Club membership (Robotics C
    7·1 answer
  • Consider an interface p ublic interface NumberFormatter { String format (in n); } Provide four classes that implement this inter
    15·1 answer
  • What should a system administrator use to disable access to a custom application for a group of users?
    5·1 answer
  • During the analysis phase of the SDLC the systems analyst will decide how the hardware, software and network infrastructure, use
    5·1 answer
  • Write a program that declares constants to represent the number of inches, feet, and yards in a mile. Name the constants INCHES_
    6·1 answer
  • Which of the following is an example of a consumer
    14·2 answers
  • A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!