1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
2 years ago
10

Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission

Computers and Technology
1 answer:
m_a_m_a [10]2 years ago
3 0

The correct explanation of why Gary is wrong is that Ports are where connectors attach to destinations, not where data enter the network.

<h3>What is a port?</h3>

A port is physical part of the computer system where the external devices are connected using cables.

Therefore, it serves as an interface between the motherboard and an external device of the computer.

From Gary statement about ports, he is wrong because, Ports are where connectors attach to destinations, not where data enter the network.

Learn more about ports here:

brainly.com/question/4804932

#SPJ1

You might be interested in
Determine the efficiency and big-O notation for the following algorithm:
Anon25 [30]

Answer and Explanation:

To calculate Big O, go through each line of code and determine O(!), O(n) and return your calculation.

For example,

In O (5 +6n), where 6 5 represent five instances of O(1), and 6 represent the 6 O(n).

We compute the time complexity of the algorithm. We get the result, just an estimation. In given algorithms, run time in milliseconds has been provided, such as in T (1) algorithm process in 512 milliseconds and T(2) algorithms process 8129 milliseconds. But big O notation not measured in milliseconds. Information given is not enough to calculate the big O notation.

       

8 0
3 years ago
What is the final value of the string output given the following code fragment? int counter = 0; int num = 0; string output = ""
swat32

int counter = 0;

int num = 0;

string output = "";

while (counter < 3) {

num = num * 1;

counter = counter + 1; }

output = Convert.ToString(num);

Output:

Counter = 0

num = 0 * 1 - - > num = 0

Counter = 1

num = 0 * 1 - - > num = 0

Counter = 2

num = 0 * 1 - - > num = 0

Counter = 3 (break)

num = 0

output = "0"

3 0
4 years ago
Consider an ERD for a beauty salon in which there is a superclass entity EMPLOYEE with four subclasses:
julsineya [31]

Answer:

Partial and disjoint

Explanation:

Since there is overlapping in relationship of HAIR_STYLIST and MANAGER it can't be tree structure.

A MANAGER can or can't be HAIR_STYLIST. In order for the relationship to be multiple inhertiance am entity in sub-class has to be union of all subclasses

In single inheritance, a sub-class has to be a union of a single super class.

In partial and disjoint, some entity in super class may or may not be related to a sub-class.

5 0
3 years ago
Print("Student" == "Teachers" or 99 != 88) will output False<br><br> true or false
ioda

Answer:

it will output True, so the statement is false

Explanation:

6 0
3 years ago
You company has decided to start using AppLocker GPOs to control application access. Jeff, Stormwind’s IT Manager, would like to
miv72 [106K]

Answer:

In the Group Policy Manager, enforce the new AppLocker policy in Audit Only mode.

Explanation:

The organization has chosen to run employing AppLocker GPOs to secure access to applications. Jeff, the Information Technology Manager at the following company, also wants to evaluate the AppLocker strategy until it is implemented.  

So, In Group Policy Manager, Jeff enforces the latest AppLocker strategy to evaluate the AppLocker policy in the Audit-Only zone because he is the IT manager of the company and he wanted to check the following policy.

3 0
3 years ago
Other questions:
  • You receive a file named Project4.xlsx as an attachment to an email message. What do you expect the file to contain?
    8·1 answer
  • Do {
    12·1 answer
  • How are additional slides added to presentations? select all that apply
    10·1 answer
  • The function ________ comprises one or more statements that are executed when the function is called.
    14·1 answer
  • Suppose we used an Internet Addressing protocol that used 4 bits to encode a single address. How many devices would be supported
    15·1 answer
  • Write two statements to read in values for my_city followed by my_state. Do not provide a prompt. Assign log_entry with current_
    13·1 answer
  • What is an internet marketing manager?
    14·1 answer
  • If the user inputs “10” for the first expense and “20” for the second expense, what will the interpreter show in the final line
    13·1 answer
  • Which of these would be the best way to inform an employee that they are losing their job?
    13·1 answer
  • Which of these is an example of an online workspace?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!