1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
6

You have installed a device that has eight interfaces and does not forward broadcast packets. What kind of device did you instal

l?
Computers and Technology
2 answers:
Novay_Z [31]3 years ago
7 0
A router, possibly. Thought I'm not for sure because I'm not in computers and technology

Dimas [21]3 years ago
7 0
I belive what you are talking about is a router, I am not good at stuff liek this but, yw.
You might be interested in
Which of the following would be considered a subtopic for a mind map?
Grace [21]

Answer:

C) Plants

Explanation:

"Ecosystem" is the topic. Then "Plants" is the sub topic. Next the "Number of trees" and "Number of shrubs" branch out from there (Pun intended (; ).

4 0
3 years ago
Why linked list is better than an array?
katrin [286]
In conclusion there are many different data structures. Each data structure has strengths and weaknesses which affect performance depending on the task. Today, we explored two data structures: arrays and linked lists. Arrays allow random access and require less memory per element (do not need space for pointers) while lacking efficiency for insertion/deletion operations and memory allocation. On the contrary, linked lists are dynamic and have faster insertion/deletion time complexities. However, linked list have a slower search time and pointers require additional memory per element in the list. Figure 10 below summarizes the strength and weakness of arrays and linked lists.
8 0
3 years ago
Several users are required to transfer files among themselves in a conference room. No APs are available for connections to the
lana66690 [7]
5272838yiwosysbkwhvsjdxbzb
8 0
3 years ago
What were black codes?
Lyrx [107]
<span>The Union victory in the Civil War may have given some 4 million slaves their freedom, but African Americans faced a new onslaught of obstacles and injustices during the Reconstruction era (1865-1877). By late 1865, when the 13th Amendment officially outlawed the institution of slavery, the question of freed blacks’ status in the postwar South was still very much unresolved. Under the lenient Reconstruction policies of President Andrew Johnson, white southerners reestablished civil authority in the former Confederate states in 1865 and 1866. They enacted a series of restrictive laws known as “black codes,” which were designed to restrict freed blacks’ activity and ensure their availability as a labor force now that slavery had been abolished. For instance, many states required blacks to sign yearly labor contracts; if they refused, they risked being arrested as vagrants and fined or forced into unpaid labor. Northern outrage over the black codes helped undermine support for Johnson’s policies, and by late 1866 control over Reconstruction had shifted to the more radical wing of the Republican Party in Congress.</span>
8 0
3 years ago
Read 2 more answers
What would be a suitable device to transfer 12 photos from one PC to another?
Arlecino [84]

Answer:

A memory stick.

Explanation:

A memory stick can be defined as a storage media device with flash memory. They are mainly used in smart or portable electronic devices such as mobile phones, digital cameras, mp3 players, camcorders, etc.

Memory sticks are usually small in size and as such are easily accessible for the transfer of digital files such as images, videos, audios from a portable device or computer to another device such as a computer.

Hence, a memory stick would be a suitable device to transfer 12 photos from one PC to another.

3 0
3 years ago
Other questions:
  • An icon in a document preset that looks like the play button on a YT video, what type of document is the preset meant to be used
    13·2 answers
  • Which of the following is a unique feature of Object-oriented programming?
    6·2 answers
  • Write a MARIE program to allow the user to input 8 integers (positive, negative, or zero) and then find the smallest and the lar
    15·1 answer
  • When I comes to saving money, what is good rule of thumb
    5·1 answer
  • for what reason do some security professionals consider insiders more dangerous than outside intruders?
    8·1 answer
  • The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
    6·1 answer
  • What steps might a company or organization need take in order to keep its digital data secure online?
    8·1 answer
  • What might happen if the internet use policies were broken at your school
    11·2 answers
  • What is the largest place value in a 12 bit binary number?
    10·1 answer
  • Rosanna is a middle school teacher. She has installed a spreadsheet program in her computer that tracks the grades and attendanc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!