1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
meriva
2 years ago
8

What standard tcp port does the bgp service operate on?

Computers and Technology
1 answer:
Yanka [14]2 years ago
3 0

Answer:

BGP neighbors are defined by an IP address. BGP uses TCP port 179 to communicate with other routers.

You might be interested in
What does it mena when they say "all germs are germs"
KiRa [710]

Answer:it means that germs are germs germs are reproductive they split apart from one another to create more germs.

Explanation:

7 0
3 years ago
Today's consoles and games have audio features that rival cinematic audio.<br> True or False?
Angelina_Jolie [31]

Answer:

true

Explanation:

4 0
2 years ago
Read 2 more answers
How did Avery and Garth most likely create their
hram777 [196]
Avery used smartart and added shake
6 0
3 years ago
What is the different thing about search engines and various components?
alexandr1967 [171]

Answer: A search engine normally consists of four components e.g. search interface, crawler (also known as a spider or bot),indexer, and database. The crawler traverses a document collection, deconstructs document text, and assigns surrogates for storage in the search engine index.

Explanation:

6 0
2 years ago
Line installers must complete a four-year university degree program in order to be hired.
german

Answer:

Line installers must complete a four-year university degree program in order to be hired.

Explanation:

true

7 0
3 years ago
Read 2 more answers
Other questions:
  • The illustrations group contains all but a _______​
    9·1 answer
  • What software is typically used for larger systems?
    11·1 answer
  • A(n ____ enables a database administrator to define schema components.
    10·1 answer
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • Which of the following software programs provides for e-mail communication?. A. Access. B. Word Perfect. C. Outlook. D. Excel
    15·2 answers
  • How can i become an ailen?
    5·2 answers
  • Whats the answer to this question?
    7·1 answer
  • For this lab you will write a class to create a user-defined type called Shapes to represent different shapes, their perimeters
    6·1 answer
  • Why do you think that network and telecommunications security careers are some of the fastest growing in the field of technology
    8·1 answer
  • Supplies/material used in iron​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!