A ________ sends information between two networks.

A. repeater
B. switch
C. bridge
D. router


Answer: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Compared to public-key ciphers such as RSA, the structure of AES and most symmetric ciphers is quite complex and cannot be explained as easily as many other cryptographic algorithms. 2. InvSubBytes is the inverse of ShiftRows. 3. The ordering of bytes within a matrix is by column. 4. In the Advanced Encryption Standard the decryption algorithm is identical to the encryption algorithm. 5. The S-box is designed to be resistant to known cryptanalytic attacks.

Computer Science & Information Technology

Which statement is used to modify column values of an existing row in a table?

A. ALTER B. CHANGE C. MODIFY D. UPDATE

Computer Science & Information Technology

A video uploaded to YouTube will be compressed when viewed on YouTube

Indicate whether the statement is true or false

Computer Science & Information Technology

The security feature of Internet Explorer that can detect a known phishing or malware site and displays the address bar in red and replaces the website with a message informing you of the risks is _________

a. Enhanced Protection Mode b. SmartScreen Filter c. Digital signatures d. Information bar

Computer Science & Information Technology