What does the router on the WAN owned by your internet service provider do
with any packet it receives?
A. The router reads the packet and sends it to another router on the
internet.
B. The router sends the packet to a central computer in a secret
location.
C. The router sends the packet directly to individual devices all over
the world.
D. The router stores the packet in an electromagnetic cloud for easy
access.

Answers

Answer 1

The router on the WAN owned by an internet service provider (ISP) does the following with any packet it receives: option A.

What is a router?

A router is a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.

In Computer networking, the router on the WAN owned by an internet service provider (ISP) is designed and developed to read the packet and then send it to another router on the internet.

Read more on router here: brainly.com/question/24812743

#SPJ1


Related Questions

What dsl variant has a distance limitation of 18,000 ft. between a dsl modem and its dslam?

Answers

The dsl variant that has a distance limitation of 18,000 ft. between a dsl modem and its dslam is known as asymmetric dsl.

What is asymmetric dsl?

It should be noted that the asymmetric dsl (digital subscriber line) is a popular internet access solution for residential locations.

It enables an existing analog telephone to share the line used for data for the transmission voice and data.

Learn more about dsl on:

brainly.com/question/14599737

#SPJ12

A lightweight directory access protocol (ldap) entry reads as follows: dn: cn=john smith ,ou=sysadmin,dc=jsmith,dc=com. What is the common name of this entry?

Answers

In the case above, the common name of this entry is said to be John Smith.

What is a common name?

A Common-name is known as the name by which a person, object or thing is known to by the all, instead of its taxonomic or scientific name.

Therefore, in the lightweight directory access protocol above,  the common name of this entry is said to be John Smith.

Learn more about  common name  from

https://brainly.com/question/261388

#SPJ12

Question 1 Fill in the blank: Internet search engines are an everyday example of how Boolean operators are used. The Boolean operator _____ expands the number of results when used in a keyword search. 1 point NOT WITH AND OR

Answers

The Boolean operator OR expands the number of results when used in a keyword search. Thus, the correct option is D.

What is the Boolean operator?

The Boolean operator may be defined as an important tool that is utilized in the programming languages for the junctions to integrate or exclude keywords in a search, resulting in more attention and generative outcomes.

The Boolean operators are major of three types with specific functions and properties. They are:

ANDNOTOR

Therefore, the Boolean operator OR expands the number of results when used in a keyword search. Thus, the correct option is D.

To learn more about Boolean operators, refer to the link:

https://brainly.com/question/1675220

#SPJ1

What's the commission payout for auto bill pay if sold with a ga?
o a. $5
o b. $1
o c. $3
o d. $2

Answers

A person can get a pre-agreed commission for each product sold and this is popular among realtors and house agents.

What is a Commission?

This refers to the service charge that a person charges his client for the fulfillment of a business commitment and is usually in percentages.

For example, a sales rep can be given a 5% commission for each sold car. Therefore, if he sells a car that is worth $20,000, then his commission would be:

5/100 * 20,000

= $1,000.

Hence, we can see that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about commissions and discounts here"

https://brainly.com/question/14776720

#SPJ1

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

Answers

A(n) access point is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

What is an access point?

An access point is known to be a kind of device that makes a wireless local area network, or WLAN, and it is often done in an office or big  building.

Therefore, A(n) access point is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

Learn more about access point from

https://brainly.com/question/14306861

#SPJ12

Where could student researchers and/or student subjects find additional resources regarding the irb approval process? select all that apply.

Answers

Student researchers or student subjects can find additional resources regarding the IRB approval process from  Faculty Advisor/Research Mentor.

What does a faculty advisor do?

The work of a Faculty Advisor is known to be a person who helps to assist in the area or activities of the team via words of encouragement, any kind of advice and guidance and others.

Note that in the scenario above, Student researchers or student subjects can find additional resources regarding the IRB approval process from  Faculty Advisor/Research Mentor.

Learn more about researchers from

https://brainly.com/question/13465907

#SPJ1

why is a salt added to a password that is being stored in a database?

Answers

The reason why we add salt to a password is to help us mitigate hash table attacks by forcing attackers to re-compute them using the salts for each user.

What is salt in database?

A cryptographic salt is composed of random bits that are added to each password instance before its hashing.

Now, Salts usually create unique passwords even in the instance of two users choosing the same passwords. Finally, the importance of adding salts is that they help us mitigate hash table attacks by forcing attackers to re-compute them using the salts for each user.

Read more about database at; https://brainly.com/question/13262352

#SPJ12

What is difference between barcode reader and finger print reader

Answers

Answer:

they are different bc finger printe reader reads when someone one prints it for them

How do you set form control properties?
A. Right-click the form in the Navigation pane, and then select Edit Controls.
B. Open in Design or Layout view, click the Design tab and then select Tools group.
C. Open in Form view, click the Design tab and then select Tools group.
D. Open in Design or Layout view, click the Arrange tab, and then select Tools group.

Answers

Answer:

Answer : B. open design tab

What is boot sector virus​

Answers

Answer:

Boot Sector virus is when a virus infects the Boot Sector of a hard disk. A Boot Sector is the initial files necessary to start an OS and other bootable programs. It is typically infected by these viruses when started with infected floppy disks, however the boot virus does not have to be successful to infect your computer. Once infected, the virus tries to infect every other disk.

Hope this helps!

what is your first step in developing the database?

Answers

The first step in developing a database is simply to have a conversation (talk) to the employees or end users who will be using the database.

What is a database?

A database can be defined as an organized and structured collection of data that are stored on a computer system as a backup and are usually accessed electronically.

As a general rule, having a conversation (talk) to the employees or end users who will be using the database is the first step in developing a database.

Read more on database here: brainly.com/question/13179611

#SPJ12

essay on the importance of computer and internet 250 word​

Answers

With the significant progress in technology, the importance of the internet has only multiplied with time. The dependence on the internet has been because of multiple advantages that it has to offer – for instance reducing the work stress and changing the face of communication most importantly. By employing the correct usage of the internet, we can find various information about the world. The internet hosts Wikipedia, which is considered to be one of the largest best-composed reference books kept up by a vast community of volunteer scholars and editors from all over the world. Through the internet, one may get answers to all their curiosity. In the education sector too, it plays a major role, especially taking into consideration the pandemic. The Internet during the pandemic provided an easy alternative to replace the traditional education system and offers additional resources for studying, students can take their classes in the comforts of their homes. Through the internet, they can also browse for classes – lectures at no extra cost. The presence of the internet is slowly replacing the use of traditional newspapers. It offers various recreational advantages as well. It can be correctly said that the internet plays a great role in the enhancement of quality of life.

Answer:

Computers and the internet are highly prevalent and crucial in our everyday lives since they are the method by which the current enormous world is linked and becomes one. Computers have altered human life by making things faster and more efficient. Individuals may generate, store, and retain data. Computers and the internet are used by businesses in a variety of areas, including banking, retail, education, and so on. Because of the rising technical capabilities of Internet connectivity, the processing and utilization of information and knowledge is becoming extremely important for society. Since the dawn of the modern era, the Internet has been an outstanding tool for global informatization. It is a fair and accessible source of varied information as well as a mechanism of knowledge dissemination. Computers are incredibly significant today since they are very precise, speedy, and can effortlessly do numerous jobs. Manually doing those activities would take significantly more time. It can perform extremely complex computations in a fraction of a second. Furthermore, it can hold a large quantity of data. One may obtain a variety of knowledge about the globe by using the internet correctly. The internet can provide answers to all of one's questions. It also plays an important part in the education sector since it is an easy alternative to the traditional education system and provides additional learning materials; students may attend their lectures from the comfort of their own homes. They may also search for lessons and lectures on the internet for free.

what methods could you use to set up printing in an organization?

Answers

The used to set up printing in an organisation are as follows;

Connecting directly to the printer setting up a print serverusing a cloud service to set up printers.

Method for printing in organisation.

There are different method for setting up printing in an organisation.

They include the following;

Connecting directly to the printer : directly connecting a printer; From small to large organizations, you have lots of ways to set up a printer.setting up a print serverusing a cloud service to set up printers. There are numerous cloud service that could render this service like goggle.

learn more on printing here: https://brainly.com/question/14668983

#SPJ11

What's a common mistake that young people in relationships make?

A. They use shortened words, making text messages difficult to understand.

B. They overshare personal information.

C. They share pictures when they should be texting instead.

D. They don't exchange their passwords soon enough.

(From Digital Technology: Ethics & Literacy)

Answers

B, i say b because oversharing something personal could result in somebody you thought you loved going back telling someone else, causing rumors to be spread out

Couples most frequently commit the errors of not actively listening to one another, taking their spouse for granted, and ignoring issues because they don't want to start a fight.Thus, option B is correct.

What common mistake that young people in relationships?

The failure to set boundaries in relationships was undoubtedly the biggest and most common problem I saw. If we don't treat one another how we would like to be treated, they won't comprehend. Setting limits is essential to preserving peace and demonstrating respect in a partnership.

It may seem apparent, but when you and another person experience the ups and downs of life together, there will inevitably be times when your respect for one another varies. Sometimes things turn out better, sometimes bad.

Therefore, They overshare personal information, a common mistake that young people in relationships make.

Learn more about relationships here:

https://brainly.com/question/9780486

#SPJ2

in the tcp/ip protocol that allows communication across the internet, what does tcp do?

Answers

TCP tells or state how applications can make channels of communication across a network.

What is the role of TCP?

TCP is known to often help in the management of how a message is put together into smaller packets before they are sent or transmitted over the internet and then put together again in the right way at the arriving or destination address.

Therefore, TCP tells or state how applications can make channels of communication across a network.

Learn more about TCP from

https://brainly.com/question/17387945

#SPJ11

Answer:

The TCP establishes a connection and a secure transmission between the client and the server.

Explanation:

It is designed to break things down as packets, then send it to the server as a request. The server will receive the request nd give you a response, initiating a connection between said services.

Hope this helps!

A(n) ____________ is a group of similar or identical computers, connected by a high-speed network, that cooperate to provide services or run a shared application.

Answers

Answer:

cluster

Explanation:

A cluster in a computer system is a collection of servers and other resources that work together to provide high reliability and, in certain situations, load balancing and parallel processing.

Using the World Wide Web, search for advice about the following issues. For each issue, search for information on the manufacturer’s web site and at least one third-party resource or forum. Consider how you found the solution for each item, what the solution is, and how the answers differ or do not differ on the manufacturer’s web site and the third-party site. If you cannot find a description or resolution of an error in two different places, explain your process searching for that information on either a third-party site or the manufacturer’s site.

What problem does the OS X Mountain Lion 10.8.2. Supplemental Update 2.0 resolve?
What are the disk space requirements for installing Windows 7 Service Pack 1 from an installation DVD?
List two causes and one solution for a 404 Error.
Define device manager error code 10 and explain how to fix it.
Describe the steps to locate the serial number on an Acer desktop computer.
How do you find out the meaning of beep codes you hear during startup?
What is the first step to take to resolve a blue screen of death error?
What steps should you take if you installed a new device driver and the computer will not start?
Explain the possible causes of a User32.dll Not Found error message.
List the steps for changing the language of your keyboard.
Write a report sharing the detailed information for each of these tasks. You may do so using bullet points or a table. You may use screen shots to illustrate a particular issue or solution. Make sure to include information about:

how you found the solution on the web sites: search, browse, ask a question, etc.;
how you located the manufacturer and/or third-party web sites you used;
the solution or details requested above; and
the difference between the solution or explanation offered by the manufacturer and the third-party website (s).
Submission Requirements
Use standard English and write full phrases or sentences. Do not use texting abbreviations or other shortcuts.
Make any tables, charts, or graphics neat and well organized.
Make the information easy to understand.

Answers

Using the World Wide Web, search for advice about the following issues the net browser (generally called a browser) is a software program person agent for getting access to statistics at the World Wide Web.

What are the three search engines like and yahoo that assist you locate statistics from extraordinary websites?

There are many extraordinary search engines like and yahoo you may use, however a number of the maximum famous consist of , Yahoo!, and Bing. To carry out a seek, you may want to navigate to a seek engine on your net browser, kind one or greater keywords—additionally called seek terms—then press Enter to your keyboard.

A browser is a laptop software that allows you to apply the laptop to view WWW files and get admission to the Internet taking benefit of textual content formatting, hypertext links, images, sounds, motion, and different features.

Read more about the browser:

https://brainly.com/question/25689052

#SPJ1

What is being done to reduce the python population in florida?.

Answers

florida man eats the snake for breakfast

in the active directory, what is the topmost level?

Answers

Note that in the active directory, the Forest is known to be the topmost level.

What is highest level in an Active Directory design?

An Active Directory forest is known to be the biggest level of organization that is found in the Active Directory as all of the forest often shares a single database.

Note therefore, that in the active directory, the Forest is known to be the topmost level.

Learn more about  active directory from

https://brainly.com/question/14364696

#SPJ11

College is considered _____ education. Please type the correct answer in the following input field, and then select the submit answer button or press the enter key when finished.

Answers

Answer:

Postsecondary education 

Explanation:

You have been receiving a lot of phishing emails sent from the domain kenyan.msn.pl. Links within these emails open new browser windows at youneedit.pl. You want to make sure that these emails never reach your inbox, but you also want to make sure that emails from other senders are not affected. What should you

Answers

The thing that should be done is to add kenyan.msn.pl to the email blacklist.

What is phishing?

It should be noted that phishing simply means an attempt to steal ones money by taking the users information online.

In this case, the thing that should be done is to add kenyan.msn.pl to the email blacklist.

Learn more about phishing on:

brainly.com/question/2537406

#SPJ12

The order in which controls receive the focus is called the ________

Answers

The order that controls receive the focus is called the tab order.

What is the Tab Order?

This us known to be the order or sequence that a given cursor moves in regards to one or from one field to another field.

Therefore, The order which controls receive the focus is called the tab order.

Learn more about Tab order from

https://brainly.com/question/8887133

#SPJ12

True or false. A plug-in card is always required to support pc sound

Answers

Answer:

False

Explanation:

The motherboard chipset frequently provides false sound functionality. A sound card is a computer expansion device that receives and sends audio. Software programs and device drivers are used to configure and operate sound cards. The input device used to obtain audio data is typically a microphone, while the output devices are typically speakers or headphones. The Sound Card translates incoming digital audio data into analog audio for playback by the speakers. In the opposite instance, the sound card may convert analog audio data from the microphone to digital data that can be saved on a computer and transformed using audio software.

A plug-in card is always required to support a personal computer (PC) sound: False.

What is a hardware?

A hardware refers to a physical component of computer system that can be seen, programmed, and touched by the end users such as:

MotherboardKeyboardSpeaker

In Computer technology, sound functions in all personal computers (PCs) are often provided by the motherboard chipset. Thus, a plug-in card is not required to support sound in a personal computer (PC).

Read more on hardware here: brainly.com/question/959479

#SPJ12

you're using a linux distribution that uses rpm for package management. which command would you use to install httpd, the apache http server package, and all its dependencies?

Answers

On a Linux distribution that functions with RPM for package management, entering yum install httpd at the command line.

What is yum install httpd?

Note that yum install httpd at the command line and it is one that will install the Apache HTTP Server package and any of its dependencies.

Note that YUM automatically finds and downloads RPM packages for a person and as such, On a Linux distribution that functions with RPM for package management, entering yum install httpd at the command line.

Learn more about  Linux distribution from

https://brainly.com/question/13139061

#SPJ11

What type of error occurs when a program is expecting an integer value and the user enters a string?

Answers

Answer:

ValueError

Explanation:

When a user calls a function with an invalid value but a valid parameter, the ValueError is generated. Even though the value is the right parameter, it typically happens in mathematical processes that call for a specific sort of number.

The type of error that occurs when a program is expecting an integer value and the user enters a string is value error.

What are errors in program?

Errors are the problems or the faults that occur in the program.

This error makes the program behave abnormally. It usually acts contrary to  what you expect.

Example of errors includes runtime error, syntax error, compilation error, value error, logic error and many more.

Therefore, type of error occurs when a program is expecting an integer value and the user enters a string is value error.

learn more on error here: https://brainly.com/question/17924309

#SPJ2

how often does windows automatically defragment a hard drive or trim a solid-state drive?

Answers

The duration that windows automatically defragment a hard drive or trim a solid-state drive is once a week.

What is windows?

It should be noted that Windows is a separate viewing area on a computer display screen in a system.

In this case, the duration that windows automatically defragment a hard drive or trim a solid-state drive is once a week.

Learn more about windows on:

brainly.com/question/25243683

#SPJ12

The _____ command defines a default value for a column when no value is given

Answers

The DEFAULT command defines a default value for a column when no value is given

How to determine the command?

In SQL and other related query languages, a column can be set to have a default value.

This is done using the constraint:

default("some text here")

Hence, the DEFAULT command defines a default value for a column when no value is given

Read more about sql at:

https://brainly.com/question/25694408

#SPJ12

A Uniform Resource Locator (URL) is an Internet address that performs which task?

Answers

A Uniform Resource Locator (URL) is an Internet address of a website identifies the method by which an Internet resource (website) is accessed.

What is a website?

A website can be defined as a collective name which connote a series of webpages that are interconnected with the same domain name or Uniform Resource Locator (URL), so as to provide certain information to end users.

In Computer technology, a Uniform Resource Locator (URL) is an Internet address of a website identifies the method by which an Internet resource (website) should be accessed by end users.

Read more on a website here: https://brainly.com/question/26324021

#SPJ12

What three best practices can help defend against social engineering attacks?

Answers

The three best practices that can help protect against social engineering are:

Be watchful of instructions to click on enticing web links.Educate employees regarding policies.Avoid disclosing your login details.Social engineering

This refers to online crimes that are socially engineered or designed to trick victims into providing certain information or carrying out certain actions that would cause unknown harm to them or others.

For example, they may be tricked into revealing their security information or other personal information via email correspondence.

You can learn more about social engineering here https://brainly.com/question/26072214

#SPJ12

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved

Answers

When a designer follow accepted standards and protocols, the basic characteristics of network architecture that's achieved is called scalability.

What is scalability?

Scalability can be defined as a measure of the ability of a system to change (increase or decrease) in performance and cost as a result of changes in demands of application and system processing, especially in a network architecture.

This ultimately implies that, scalability is the basic characteristics of network architecture that's achieved when a designer follow accepted standards and protocols.

Read more on scalability here: https://brainly.com/question/14301721

SPJ12

Other Questions
A container is an open cylinder whose height and radius are of equal length. The total surface area of the container is 300 cm. Find the radius of the container. What factors of Japans geography make it necessary for it to import so many goods?What factors of Japans geography make it necessary for it to import so many goods Which sentence below punctuates the dialogue correctly?A. " can't see it, " remarked Carlton. B. "Where are we? Shana asked?"C. "I can't make it out," admitted Carlton. It's like a black curtain in front of me." New Zealand's exports are primarily based on _____ while Australia's exports are primarily based on _____. What are the features of the quadratic function f(x)=(x-3)(x+7)? Together, this ensemble of electronic techniques called intobeing a new world - a peek-a-boo world, where now this event,now that, pops into view for a moment, then vanishes again. It isa world without much coherence or sense; a world that does notask us, indeed, does not permit us to do anything; a world that is,like the child's game of peek-a-boo, entirely self-contained. Butlike peek-a-boo, it is also endlessly entertaining.Which statement most accurately describes how the author's word choice expresseshis feelings on electronic media, such as television?OA. Postman's excitement about the changes over the past 100 years in howwe consume media comes through in his word choice.B. Calling our culture a "peek-a-boo" world suggests that the author thinksnew media have made us more childlike.OC. The idea that peek-a-boo is "endlessly entertaining is false; just asadults grow out of peek-a-boo, they get tired of television.D. By comparing new media to an 'ensemble," the author asserts that newmedia create harmony between people like never before. 53 points!!! find x. do not round your answer. 5cm 6cm 12cm x Mr. Wu is eligible for medicare. He has limited financial resources but failed to qualify for the part d low-income subsidy. Where might he turn for help with his prescription drug costs?. A ligamentous connection such as an antebrachial interosseous membrane is called a. algebra 2 help needed image below urgent !!! Which is a reactant for the photosynthesis reaction? A. Adenosine triphosphate B. Oxygen C. Carbon dioxide D. Glucose which equation matches this graph? 45.8 grams of copper requires 1172 J of heat to reach a final temperature of 100.5 . What was the initial temperature? Specific heat of copper is 0.385 J/g. (7.02)A. 66.5[?][?][?]B. 122[?][?][?]C. 34.0[?][?][?]D. 75.2[?][?][?]I also have no idea what the [?][?][?] is. Can someone please help me for 25 points? :'( Which combination is not a buffer?NaCN + HCNNH3 + NH4ClCH3COOH + CH3COONaNaCl + HCl 1. Identify your variables using let statements. 2. Determine the equations for the linear system. 3. Determine the solution to the linear system (point of intersection) 4. Explain the meaning of the solution using a therefore statement. Chris is mixing 2 different types of fruit juice together for a summer drink. The two types of juices he is using is one that is 30% strawberry concentrate and the other is 55% lemon concentrate. If he wants 2 L that is 40% concentrate of the fruit juices, how much of each should be used to create the drink? In a stadium, 1,000 tickets were sold. Childrens tickets cost $2.50 each and adults tickets cost $5.00 each. The revenue collected for the game was $4,000. How many childrens tickets were sold? How many adults tickets were sold? What are the solution(s) to the quadratic equation 9x = 4?0 x =and x =0 x =I694and x = -20 x = and x = -2Ono real solution The average daily high temperature in [tex] ^{\circ}C[/tex] in Karachi, Pakistan, on the [tex]t^{\text{th}}[/tex] day of the year is approximately[tex]\qquad T(t) = 29 - 5\cos\left(\dfrac{2\pi (t- 12)}{365}\right)[/tex]What are the highest and lowest average daily highs in Karachi? Give exact answers.[tex]\rule{250pt}{2pt}[/tex]Please explain it "thoroughly" in 'sentences' and with mathematical expression how exactly you'd figure out the answer. I know the answer. I need an elaborate explanation of the method. It's an imperative part of the question to explain your answer otherwise your answer would be considered incompleteGiving 25 points, thanks (both in your answer and profile)!5 stars and of course brainliest!!! there were 3 parts to Ritas race she ran the first part which was 4/9 of the total distance, in 20 minutes she ran the second part which was 2/5 of the remaining distance, in 12 minutes. She finally ran the third part in 15 minutes at the speed of 300 meters per minute.How long was the first part of the race? What was Ritas speed in that section of the race? Producers can generate instant sales by using devices.forecasts.patterns.websites.D.website