A(n) ____ variable is used to control the lifetime of each entry in the routing table.
A. invalid timer
B. update timer
C. hold-time timer
D. flush timer
Answer: D
Computer Science & Information Technology
You might also like to view...
Coda clients enter the __________ when they are connected to Coda.
a) initiation stage b) hoarding stage c) emulation stage c) reintegration stage
Computer Science & Information Technology
XML files are text files, but are NOT saved with the .txt file type
Indicate whether the statement is true or false.
Computer Science & Information Technology
In the accompanying figure, the key symbol that appears in the row selector for the Business Analyst Number field indicates that Business Analyst Number is the ____ for the table.
A. principal key B. foreign key C. primary key D. main key
Computer Science & Information Technology
____ devices are designed to withstand much more physical abuse than conventional devices.
A. Secured B. Ruggedized C. Malleable D. Flexible
Computer Science & Information Technology