1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
2 years ago
8

The network layer of the ISO/OSI model organize bits into ..........​

Computers and Technology
1 answer:
galben [10]2 years ago
8 0

Answer:

frames

Explanation:

The data-link layer is the second layer from the bottom of the OSI Model. The data-link layer's principal role is to identify errors and merge data bits into frames.

You might be interested in
Parts are described by partnum, color, and price. Parts can be subassemblies as well and this means that they contain other part
sladkih [1.3K]

Answer:

Attached is the solution:

5 0
3 years ago
In a programming language, a(n) ______, or command, is a word with a predefined meaning​
aniked [119]
<span>In a programming language, a keyword, or command, is a word with a predefined meaning​</span>
6 0
4 years ago
Read 2 more answers
In this recitation assignment, will write a complete C program that accepts as input any two integers from the user and swaps bo
katovenus [111]

Answer:

#include<iostream>

using namespace std;

int main()

{int num1,num2;

cout<<"enter 2 numbers:"<<endl;

cinn>>num1;

cinn>>num2;

cout<<("value without swapping of num1",num1);

cout<<("value without swapping of num2",num2);

 num1 ^= num2;

   num2 ^= num1;

   num1 ^= num2;

cout<<("num1 after swapping",num1);

cout<<("num2 after swapping,num2);

return 0;

}

6 0
3 years ago
Describe three ways to protect the computer and all peripheral devices from damage
omeli [17]

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.<span>

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

<span>Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. </span></span>

3 0
4 years ago
Lourdes is going to create a company logo. She will create it in a vector format so that she can resize it without distortion. W
kirill [66]

Explanation:

military

hope this helps you

5 0
3 years ago
Other questions:
  • What is the portion of the PowerPoint window that contains the current slide, total slides, zoom options, and various shortcuts
    8·1 answer
  • When asking questions critisim it is best to
    13·2 answers
  • Which is an example of compound meter?<br> 2/4<br> O 4/4<br> O 6/8<br> Onone of the above
    5·2 answers
  • What does the clone tile command do?
    15·2 answers
  • 2. You can ___ adjust to NOT sleeping at night.
    13·1 answer
  • Which elements of a myth appear in this story from early babylon
    14·1 answer
  • Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is mor
    7·1 answer
  • Write a description about this picture
    13·2 answers
  • ANSWER QUICKLY!!!
    5·1 answer
  • How do you convert hexadecimal to denary
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!