A(n) ____ variable is used to control the lifetime of each entry in the routing table.

A. invalid timer
B. update timer
C. hold-time timer
D. flush timer


Answer: D

Computer Science & Information Technology

You might also like to view...

Coda clients enter the __________ when they are connected to Coda.

a) initiation stage b) hoarding stage c) emulation stage c) reintegration stage

Computer Science & Information Technology

XML files are text files, but are NOT saved with the .txt file type

Indicate whether the statement is true or false.

Computer Science & Information Technology

In the accompanying figure, the key symbol that appears in the row selector for the Business Analyst Number field indicates that Business Analyst Number is the ____ for the table.

A. principal key B. foreign key C. primary key D. main key

Computer Science & Information Technology

____ devices are designed to withstand much more physical abuse than conventional devices.

A. Secured B. Ruggedized C. Malleable D. Flexible

Computer Science & Information Technology