1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
3 years ago
11

If you ping a device, you are using the______protocol

Computers and Technology
1 answer:
meriva3 years ago
6 0
Joystick..................:-)
You might be interested in
Read the following scenario. How might Sarah correct successfully complete her task? To permanently remove a file from her compu
Mekhanik [1.2K]

I'd go with two answers.

A: To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option.

Or

B: Empty the Recycle Bin.

This question is somewhat not clear. Why I went with the answers above is because I really do not know what kind of a file Sarah wants to permanently remove. You can permanently delete a program file installed in the computer by following the procedure in option A. The option above will take you to the control panel and you'll be able to select the program you'd want to permanently remove. If you had initially deleted a file like a picture or a document or anything else that you necessarily do not need, it will go to recycle bin. You can head over there and select the Empty the Recycle Bin option to permanently delete the file.

7 0
3 years ago
10. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second fr
Neporo4naja [7]

Answer:

It is done to avoid collision among the channel.

Explanation:

CSMA/CD stands for carrier sense multiple access/collision detection.

It is a media access protocol that tells the devices how to respond when a channel is used simultaneously by two devices. The main purpose is to manage the transmission when a collision is encountered.

In the given scenario when the channel is detected idle, the station does not transmits second frame in order to avoid collision. CSMA/CD protocol is designed so that after transmission of first frame, second frame transmission is started at step 2 instead of step 1.

Following is given the flow chart that depicts the working of the protocol CSMA/CD:

<h2> I hope it will help you!</h2><h2 /><h2 />

7 0
3 years ago
All of the following are tips for a great presentation except
Burka [1]

Answer: B. Use a variety of animations on most slides to keep your audiences attention.

Explanation:

While animations can serve as a tool to make your presentation more engaging, too many of them can end up being a distraction and can end up potentially frustrating the audience.

5 0
3 years ago
Read 2 more answers
3 examples of operating systems ​
Citrus2011 [14]

Answer:

Linux, Windows, Macintosh

Explanation:

8 0
3 years ago
Dsc test transmission may​
Drupady [299]
Wait what? Stream blue hour tho$
4 0
3 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • In asps, the code to tie the database to the web site is typically written in javascript or ____.
    15·1 answer
  • Which of the following Statements accurately describes the legality of telemarketing
    12·1 answer
  • Your neighbor has moved to another country. He informs you about his new job. You wantto congratulate him by sending an e-mail m
    13·1 answer
  • Banking Account
    9·1 answer
  • If you were teaching a fellow student to use software for the first time and the software had many built-in hotkeys, would you f
    11·1 answer
  • It is not necessary to develop strategies to separate good information and bad information on the internet. True or False
    7·1 answer
  • Which symbol is at the beginning and end of a multiline comment block? ### &amp;&amp;&amp; %%% """
    14·1 answer
  • A(n) _____ exists when there are functional dependencies such that XY is functionally dependent on WZ, X is functionally depende
    14·2 answers
  • Choose the response that best completes the following statement.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!