1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
10

Do any of these algorithms (Random Allocation, Round-Robin, Weighted Round-Robin, Round-Robin DNS Load Balancing, and Least Conn

ections) compromise security?
Computers and Technology
1 answer:
ololo11 [35]3 years ago
4 0

Answer:

yes and

Explanation:

why do you need to know about a buildings security are you going to rob it ???

You might be interested in
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
OleMash [197]

XOR is 1 when either of the inputs is 1 but not when they both are.

1 xor 1 = 0

3 0
3 years ago
Question # 18
borishaifa [10]

Answer:what qustoin

Explanation:sorry wala yung tanong

6 0
3 years ago
Write a program that prompts the user to input five decimal numbers. The program should then add the five decimal numbers, conve
juin [17]

Answer:

#include <iostream>

#include <cmath>

using namespace std;

int main()

{

   double num1, num2, num3, num4, num5, sum = 0;

   cout << "Input: ";

   cin >> num1 >> num2 >> num3 >> num4 >> num5;

   

   sum = num1 + num2 + num3 + num4 + num5;

   cout << "Output: " << static_cast<int>(round(sum)) << endl;

   return 0;

}

Explanation:

Include cmath to use the round function

Declare the variables

Get the five numbers from the user

Sum them and assign the result to the sum

Round the sum using the round function, and convert the sum to an integer using static_cast statement

Print the sum

6 0
4 years ago
A person or company that pays you to do something for them is your _____.
Andrew [12]

Answer:

client

Explanation:

client is someone that needs help

6 0
3 years ago
Read 2 more answers
TCO B) Which of the following is a correct statement? (Points : 8)
melamori03 [73]
The first one, "<span>A </span>SYN flood<span> is a form of denial-of-service attack in which an attacker sends a succession of </span>SYN<span> requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic." </span>
5 0
4 years ago
Other questions:
  • Why is it important to save a print copy of electronic sources
    5·1 answer
  • A user from the accounting department has contacted you regarding problems with a dot matrix printer. When you examine the outpu
    7·1 answer
  • 2. Use the Internet to research Robocopy switches and then construct a command line that will use Robocopy to copy files in rest
    14·1 answer
  • What is modularity? Help asap
    9·1 answer
  • Which of the following types of networks encrypts data for transmitting over
    15·1 answer
  • What sort of technique would you use to sort 10,000 items using just 1000 available slot in your RAM?
    6·1 answer
  • Computer that process digital as well as analogue signals​
    11·1 answer
  • Httpsdiscord.ggBVNuFMgG link is here<br>come and join discord​
    13·1 answer
  • A. Modify the FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating,
    12·1 answer
  • E. Write an algorithm to show 'How to prepare a cucumber sandwich?". ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!