If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops

Answers

Answer 1

Answer:

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.

Explanation:

Routing Information Protocol (RIP) is a type of dynamic routing protocol which finds the best path between the source and the destination network through the use of hop count as a routing metric. The path with the lowest hop count from source to destination is considered as the best route. Routing Information Protocol (RIP) is a distance-vector routing protocol.

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.


Related Questions

_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen

Answers

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

Popular mixed drinks such as margaritas

contain more alcohol than a standard drink.

A. will

B. do not necessarily

O C. never

Drugs

the chemistry of the brain and the way that a person thinks.

A. change

B. don't change

C. trick

Highway Safety Administration

Answers

Answer:

C.never and A.change that's what I think

What is an html skeleton? If you know what it is can you write it for me?

Answers

Answer:

HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.

Explanation:

what is microsoft speadsheet

Answers

Answer:

Exel if I spelled it right

Explanation: It is very good

Answer:

It's called Excel and it's in Office 365

Explanation:

It's very useful in my opinion to organize any graphs or information you would like to store online.

define computer network

Answers

Computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

which is known as accurate processing of computer gigo E mail MHz bug​

Answers

GIGO is the considered as the accurate processing in computers.

In the field of computer science, the word GIGO stands for " garbage in, garbage out".

It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.

It is the inability of the program to any bad data providing incorrect results.

Thus GIGO is the most accurate processing in a computer programs.

Learn more :

https://brainly.in/question/23091232

Question 1:
The Wayfinder is an ancient piece of technology created as a means of navigating challenging stretches of space. The device connects to every piece of technology in the galaxy in order to detect planets and spaceships and then shown their location to the user. As it happens, locations of planets follow a specific distribution. A planet can exist at coordinates x,y only if
2x² + |2xy| + y² =10000
The user can use the Wayfinder to find nearby planets by input the range for x and y. Draw a flowchart and write a C++ program that models the Wayfinder. Ask the user to input a range for x and y, then print all possible planet coordinates. The program should also print the number of planets detected.
Hint: you can use pow(x,n) to get the value of xn and abs(x) to get the absolute value of x.

helpppppppppp!!!!!!!!!!

Sample output:

Answers

Answer:

Following are the code to the given question:

#include<iostream>//header file

#include<math.h>//header file

using namespace std;

int main()//main method

{

   long long x, x1, y, y1;//defining long variable

   int count=0,i,j;//defining integer variable

   cout<<"Enter a range for x coordinates: "<<endl;//print message        

   cin>>x>>x1;//input x and x1 value                          

   cout<<"Enter a range for y coordinates: "<<endl;//print message

   cin>>y>>y1; //input y and y1 value  

   for(i = x; i <= -x1; i++)//use nested loop that tests each coordinates                                        

   {

       for(j = y; j <= y1; j++)//use nested loop that tests each coordinates

       {

           if(((2*pow(i,2)) + abs(2*i*j) + pow(j,2)) == 10000)//use if that checks condition as per the given question

           {

               cout<<"There is a planet at "<<i<<", "<<j<<endl;//  print coordinates

               count++;//incrementing count variable value                                                    

           }

       }

   }

   cout<<"Total number of planets detected are: "<<count<<endl;//print count value

   return 0;

}

Explanation:

In this code, inside the main method long "x, x1, y, and y1" and integer "count, i, and j" type variable is declared that uses a long variable to input value from the user-end.

In the next step, two nested loops have defined that test each coordinate and define if block that checks condition as per the given question and use i, j, and count variable to print value with the message.

All of the following are true of functions except: Group of answer choices They define specific tasks that can be used at many points in a program A function call must specify the name and arguments of the function The definition of a function usually is visible to other functions The implementation of a function is hidden from the caller

Answers

Answer:

The definition of a function usually is visible to other functions.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

A parameter can be defined as a value that can be passed to a function. This value can be passed to a function either by reference or by value.

This ultimately implies that, parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.

Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

Hence, when you create classes or variables in a function, you can can set the values for their parameters.

Furthermore, the true statements about a function includes;

I. A function define specific tasks that reusable at many points in a program.

II. The name and arguments of the function must be specified by a function.

III. The implementation of a function is generally hidden from the caller.

If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.

Answers

Answer:

Normal

Explanation:

If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.

What is presentation?

Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.

Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.

It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.

Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.

To learn more about the presentation, refer to the below link:

https://brainly.com/question/17087249

#SPJ2

In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between different ideas is called
A. SmartArt
B. WordArt
C. Clip Art
D. Number Art

Answers

Answer:

A. SmartArt

Explanation:

SmartArt is a graphical tool used to visually communicate information.

State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translates the machine language into programming language. Backup is a process of shrinking the files on a disk. VisiCalc was the first computer spreadsheet program. An interpreter translates the whole program into an equivalent code in one go.​

Answers

Answer:

2. translates program written in any programming language into Machine language

last ko . false

Explanation:

aru aaunna

IN C++ PLEASE!!! Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector that are greater than zero in reverse order, each on a new line.

Ex: If the input is -19 34 -54 65 -1, the output is:

65
34

#include
#include
using namespace std;

int main() {

/* Your solution goes here */

return 0;
}

Answers

#include
#include
using namespace std;

int main(){

int input[] = {-19, 34, -54, 65, -1};
std::vector voutput:
std::vector vinput (input, input + sizeof(input) / sizeof(int) );

for (std::vector::iterator it = vinput.begin(); it != vinput.end(); ++it)
if(*it > 0) voutput.insert(voutput.begin(), *it);
for(std::vector::iterator it = voutput.begin(); it < voutput.end(); ++it)
std::cout << *it << ‘\n’ ;

return 0;
}

The program is an illustration of vectors; vectors are data structures that are used to hold multiple values in one variable name

The main program

The program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

   //This declares the vector

   vector<int> nums;

   //This declares an integer variable

   int num;

   //Thie gets the first input

   cin>>num;

   //This loops is repeated until the user enters -1

   while(num != -1){

       nums.push_back(num);

       cin>>num; }  

   //This iterates through the vector

   for (auto i = nums.begin(); i != nums.end(); ++i){

       //This checks if the current element is above 1

       if(*i > 0){

           //If yes, the element is printed

           cout << *i <<endl;

       }      

   }

       return 0;

}

Read more about C++ programs at:

https://brainly.com/question/24027643

The doubling of the power of microprocessor technology while the costs of its production decreases by half is called ______ Law.

Answers

Answer:

The doubling of the power of microprocessor technology while the costs of its production decreases by half is called Moore's Law.

Explanation:

The Moore's Law was a law derived from a projection on historical trend of the number of transistors in integrated circuits rather than a statement based on laws of Physics. This law stated originally that the number of transistors in an integrated circuit doubles whereas production costs halves due to gain in manufacturing and design experiences every two years. This empirical law was formulated in 1.965.

Microprocessors are IC-based.

The complete answer is: The doubling of the power of microprocessor technology while the costs of its production decreases by half is called Moore's Law.

Draw a flow chart except the principle, time and date from the user. and display the simple interest and amount as output.​

Answers

Answer:

See attachment for flowchart

Explanation:

The explanation is as follows

1. Start

2. Get input for principal, time and rate

3. Calculate Interest using Interest = Principal * Rate * Time/100

4. Print Interest

5. Stop

A program that allows employees to choose their starting and ending times, as long as they are at work during a specified core period, is called ______.

Answers

Answer:

flextimes

Explanation:

Flex times is defined as the flexible time that is scheduled for allowing the workers to alter the workday start and their finish times. This is in contrast to the traditional work arrangements which require for the employees to start work at a standard 9 a.m. and to finish at 5 p.m.

It is program which allows the employees to choose a suitable starting time as an ending time for doing their work during the specified core period.

Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time

Answers

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.

Answers

Answer:

The right response is "Robots ".

Explanation:

A robot seems to be an independent machine that can detect its surroundings, conduct simulations, as well as take action throughout the modern or actual environment.It is indeed a piece of computer-controlled equipment, which would also be utilized autonomously for carrying out duties or other hazardous tasks.

Artificial intelligence is a far more superior or complicated aspect of intelligence. They make use of patterns to find solutions to various problems.

Artificial intelligence machines are called robots. These tend to work and perform tasks that are much complex and length within short and simple steps. They can be sued to free the workers and help in any hazardous situation or events. Hence they serve the purpose of bots or robots.

Learn more about the context of applications of artificial intelligence (AI).

brainly.com/question/24259157.

to which category of software does Microsoft Works belong
a) custom-written
b) customized
c) integrated
d) special purpose ​

Answers

Answer:

c) Integrated

Explanation:

Integrated software are packages that has the functional capacity to perform the several tasks commonly performed by more than one productivity software application, such that those functions and capabilities are integrated into a single application, thereby making it possible for users to carry out required computer tasks, at a lower cost

Examples of integrated software include Microsoft Works, which includes a Word processing, spreadsheet, and database capabilities combined into one application

If an element is present in an array of length n, how many element visits, on average, are necessary to find it using a linear search

Answers

Answer:

n/2

Explanation:

A linear search starts at the beggining of the array at index 0 and searches for the specific element by analyzing one element at a time. Meaning that if it does not exist in index 0 it moves to index 1 and if its not there it moves to index 2 and so on. If the element is not present in the array it finishes the array and ends, otherwise if it finds the element the search automatically ends. This means that on average the search would end early half of the time. This would mean that on average a total of n/2 elements are visited using a linear search.

Write the definition of a public class Simple. The class has no constructors, methods or instance variables.

Answers

Answer:

public class Simple{}

Explanation:

Your internal network is protected from Internet attacks by a Cisco firewall. To improve security, your supervisor suggests installing a Fortinet firewall between the Cisco firewall and the trusted LAN, then using the space between as a perimeter network. Which security principles does this promote

Answers

Answer:

Defense-in-depth

Vendor diversity

Explanation:

The Defense-in-depth or the DiD means a security approach in information where a series of security mechanism and also controls are layered throughput the computer network in order to protect the confidentiality, availability and integrity of the network as well as the data within.

The security principle of Vendor diversity approach is a way of implementing the security controls from the different vendors to increase the security of the network.

Thus in the context, the supervisor is trying to promote the Defense-in-depth  as well as the Vendor diversity principles of security by asking to install a Fortinet firewall between the Cisco firewall and its trusted LAN.

What type of compression uses an algorithm that allows viewing the graphics file without losing any portion of the data

Answers

Answer: Lossless Compression

Explanation:

The type of compression that uses an algorithm which allows viewing the graphics file without losing any portion of the data is referred to as the lossless compression.

Lossless compression refers to a form of data compression algorithms which enables the reconstruction of the original data from the compressed data.


Write a short note on Computer
impact on
our society?​

Answers

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

Answer:

Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.

Explanation:

Positive Impact of Computer:-

The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.

Negative Impact of Computer:-

Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.

which one will be the correct answer​
pls tell

Answers

Answer:

option c clean boot. it is correct.

Option c, clean boots is the correct answer

Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called: cumulative sequence check batch sequence check suspense file of missing numbers computer agreement of batch totals

Answers

Answer:

batch sequence check.

Explanation:

A batch sequence check can be defined as a strategic and systematic control plan which typically involves the process of inputting a range of numbers comprising a batch and then inputting each serially numbered document.

The steps for checking an event data within a batch using a batch sequence check include the following;

I. You'll enter a range of serial numbers of the document in a batch.

II. You'll enter each serially pre-numbered document one after the other.

III. The input documents are sorted by a computer into a serial (numerical) order, match the sequence number range against the input documents, and then reports any part of the document that is missing, a duplicate and out of range.

write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit

Answers

Answer:

total = 0

for i = 1 to 7

input temp

temp = temp * 1.8 + 32

total + = temp

average = total/7

print average

Explanation:

[Initialize total to 0]

total = 0

[Iterate from 1 to 7]

for i = 1 to 7

[Get input for temperature]

input temp

[Convert to degree Fahrenheit]

temp = temp * 1.8 + 32

[Calculate total]

total + = temp

[Calculate average]

average = total/7

[Print average]

print average

Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.

82 point question even tho it’s really easy

Answers

Answer:

swa#22*88#&mu#hu..

Explanation:

hope it correct

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?

Answers

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

Other Questions
The word "ghosts" creates a sense offear.loneliness.hostility.confusion. Suggest two reasons why carbon dioxide emissions from electricity production decreased from 2012 to 2015 Which of MacCurries statements best summarizes his opinion of Prohibition? A box contains 3 red balls, 5 white balls, and 10 green balls. If a ball is chosen at random, what is the probability that it is either white OR green?a. 3/10b. 5/6c. 1/2d. 1/15 Use cross products to identify the equation needed to solve this proportion:5x = 29 Two spheres have are such that the radius of the bigger sphere is 3 times bigger than the smaller. What is the ratio of the area? When stagflation occurs, what happens to American trade? A. It increases rapidly. B. It decreases rapidly. C. It completely stops. D. It leads to a global depression. The predominant forms of actin inside a cell are ATP-G-actin and ADP-F actin. What would be the consequence for actin filament assembly/disassembly if a mutation prevented actin's ability to bind ATP When 7 times a number is decreased by 8, the answer is the same as when 3 times the number is increased by 4. Find the number. give 3 reasonable facts that prove the difference of type 1 diabetes and type 2 diabetes ACS Industries is considering a project with an initial cost of $6.2 million. The project will produce cash inflows of $1.8 million a year for five years. The firm uses the subjective approach to assign discount rates to projects. For this project, the subjective adjustment is 2%. The firm has a pre-tax cost of debt of 6.7% and a cost of equity of 9.4%. The debt-equity ratio is 0.6 and the tax rate is 35%. What is the net present value of the project A painting by Jacques-Louis David. Roman orator Horace receives allegiance from his three sons to protect Rome. What is the title of the piece above? a. Oath of Horatii b. Oath of Horatio c. Oath of Horus d. Oath of Homer Please select the best answer from the choices provided A B C D Which is most likely the healthiest serving of meat?A. broiled fish in a butter sauceB. honey-battered and fried shrimpC. baked, skinless chicken breast with a tomato sauceD. breaded chicken breast smothered in a parmesan cheese sauce animales muy sencillos cojmcuerpo bando a Anelidos b Artropodos c nidarios d Equinodermos A technician needs to manage a Linux-based system from the GUI remotely. Which of the technician should the technician deploy An economic instructor at UCF is interested in the relationship between hours spent studying and total points earned in a course. Data collected on 11 students who took the course last semester follow: # of observation(s) n = 30 # of independent variable(s) = 1 SSR = 1,297 SSE= 920 Required:Find the F test statistic. let f(x)=7x-4 what is f(6)? Which of the following is NOT part of the micro-environment politicssocial interactiontechnological know-how Write down the name of two attributes used along tag.Single line text. Does this equation show that transmutation has taken place during decay?Why or why not?Ni S.Ni+yA. No, because there is conservation of the number of atoms as wellas the number of nucleons.B. No, because high-energy electromagnetic waves are emitted.C. Yes, because the numbers of nucleons and atoms are conserved.D. Yes, because nickel atoms remain nickel atoms with the samenumber of neutrons.