1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leno4ka [110]
3 years ago
8

You are asked to install a device that will combine several connections to the Internet and provide the sum of the available net

work speeds to an internal network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install?
a. Wired controllerb. Multilayer switchc. Dual modemd. Multilayer routere. Load balancer
Computers and Technology
2 answers:
ch4aika [34]3 years ago
8 0

Answer:

load balancer.

Explanation:

Based on the scenario being described within the question it can be said that you are being asked to install a load balancer. This is a device that behaves as a reverse proxy in order to correctly and efficiently distribute all the network traffic across various servers in order to increase the amount of users that can use the server at the same time.

ira [324]3 years ago
4 0

Answer:

load balancer

Explanation:

Load Balancing in computing is the proper distribution of various tasks across a set of resources a device that will combine several connections and provide the sum of the available network speed and also share the data traffic among all internet connections ( server ) would most likely be a load balancer .

A load balancer also known as a server pool is a device used to distribute network or application traffic across servers, it enables the multiple connection of users to applications as the same time ( concurrently ) therefore the device you will install is a Load balancer.

You might be interested in
Write a program to demonstrate doubly linked list using pointers – insert (beginning, end,
Mekhanik [1.2K]

A program to demonstrate doubly linked list using pointers – insert (beginning, end, middle), delete(beginning, end, middle),view) is:

/* Initialize nodes */

struct node *head;

struct node *one = NULL;

struct node *two = NULL;

struct node *three = NULL;

/* Allocate memory */

one = malloc(sizeof(struct node));

two = malloc(sizeof(struct node));

three = malloc(sizeof(struct node));

/* Assign data values */

one->data = 1;

two->data = 2;

three->data = 3;

/* Connect nodes */

one->next = two;

one->prev = NULL;

two->next = three;

two->prev = one;

three->next = NULL;

three->prev = two;

/* Save address of first node in head */

head = one;

<h3>What is a Doubly Linked List?</h3>

This refers to the linked data structure that contains of a set of sequentially linked records called nodes.

The requested program is given above.

Read more about doubly linked list here:

brainly.com/question/13326183

#SPJ1

3 0
1 year ago
What is three-way handshake? Draw a diagram showing how a TCP connection is established through three-way handshake.
Levart [38]

Explanation:

A three way handshake is a method to create a connection between host and server.It is used in a TCP/IP network.

To establish a connection three steps are followed which are as following:-

  1. The host or sender sends a data packet called SYN to the server or receiver.It's purpose is to as if the receiver is open for new connections.
  2. When the receiver receives the SYN packet it responds with an ACK or SYN/ACK packet as a confirmation for the connection.
  3. When the sender receives the SYN/ACK packet and it respond with ACK packet.

8 0
3 years ago
Read 2 more answers
Types of function in python programming language​
timama [110]

Answer:

there is  help()  min()  and input() they are the base for python language!
there are some harder ones like User-Defined Functions (UDFs) and set()

4 0
2 years ago
By compromising a Windows XP application that ran on a Windows 10 machine, an attacker installed persistent malware on a victim
777dan777 [17]

The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

<h3>What does shim mean in computing?</h3>

A shim is known to be a piece of code that is said to be used to change for better the behavior of code that is said to often exists, and this is often done by adding new API that functions around the problem.

Note that this is not the same like a polyfill, that implements a new API and as such, The thing that the  attacker add to the registry, along with its files added to the system folder, to execute this malware is known to be a shim.

Learn more about malware  from

brainly.com/question/399317

#SPJ1

7 0
1 year ago
What are loans to a company or government for a set amount of time
julia-pushkina [17]
Loans to corporations for a certain period of time is called a term. Hopefully this is helpful:3
6 0
3 years ago
Other questions:
  • How should a cover letter begin?
    13·2 answers
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • You will be safe from downloading viruses as long as you have software to monitor your computer. true or false
    6·2 answers
  • 1.Write the Qbasic program to find sum of any 10 different numbers.
    12·1 answer
  • The bank has a website that’s been attacked. The attacker utilized the login screen, and rather than entering proper login crede
    14·1 answer
  • Nonverbal communication includes _____.
    9·2 answers
  • The 'WIMP' environment is much more user friendly,why?​
    11·2 answers
  • Search..
    14·1 answer
  • Choose the correct term to complete the sentence.
    11·1 answer
  • Why was the tesla model s help change the was we see EV
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!