Users at a remote office connected to headquarters are using a dynamic routing protocol. There are several paths to headquarters in the event of a route failure. The network technician has noticed that when a failure occurs there is a time lag of several minutes until service is restored. Which of the following describes the time lag?

A. Convergence
B. Update algorithm
C. Static routing
D. Distancevector


Answer: A. Convergence

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. In a particular file, the names from the global namespace and names from an unnamed namespace defined in the file are accesses the same way: by writing the name. 2. If I just write code, it is not in any namespace. 3. The scope of a using directive or using declaration is from its position in the block to the end of the program. 4. You can have a name spelled the same in two different namespaces with no conflict in your program.

Computer Science & Information Technology

Write a JavaFX application uses a text field to get the name of a file, reads the file byte by byte, and displays the bytes as characters. (Exercise 15 describes how to convert a byte value to a character.) Display the first 20 characters in a label. If a byte does not correspond to a legal character, display a space instead. Clicking the Next button reads and displays the next 20 characters in the file. The GUI might look like the sketch in Figure 10.8.

Important note: This program will only read a binary file created using ObjectOutputStream. This is because it sues ObjectInputStream to read the file, which won’t work on text files. The chapter doesn’t cover material on reading an arbitrary file as bytes. This project creates a JavaFX application that will let students explore the formatting of various kinds of files. It is very helpful to have a couple methods that process the file. This solution has two such methods. The first method gets 20 bytes and converts them into characters. It uses the method toChars from the Character class to create an array of 8 characters of which the only one we want is the first. The second method opens the file and calls the first method to get the initial 20 bytes for the display.

Computer Science & Information Technology

_______ displays and stores an object within the destination file.

A. Copy and Paste B. Linking C. Embedding D. Inserting

Computer Science & Information Technology

Choose the correct pronoun in the following sentence.?Her aunt, ___________ we visited over the summer, is a park ranger.

A. ?who B. ?whom

Computer Science & Information Technology