1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
3 years ago
11

Switches operate on what layer of the OSI Model

Computers and Technology
1 answer:
Makovka662 [10]3 years ago
8 0
The answer is Datalink Layer.
You might be interested in
What was the purpose of the Internet Architecture Board?
Nata [24]

Answer:

c to help build the internets infrastrucuter

Explanation:

6 0
2 years ago
Read 2 more answers
What will you recommend to HP Mini 5103 Notebook?​
laiz [17]
Hey what are you guys going on with your dad today or tomorrow night
5 0
2 years ago
when connecting to a wireless local area network (wlan), what is the most important fact about the service set identifier (ssid)
iragen [17]

The most important fact about the service set identifier (SSID) is that all the end users and all access points (AP) must be configured with matching SSIDs.

<h3>What is SSID?</h3>

SSID is an acronym for service set identifier and it can be defined as the generic name given to a wireless local area network (WLAN) connection.

In Computer networking, the most important fact about the service set identifier (SSID) is that all the end users and all access points (AP) must be configured with matching SSIDs.

Read more on wireless local area network here: brainly.com/question/13697151

#SPJ11

4 0
1 year ago
Explain how chord works. To increasing the fault tolerance in chord, each node maintains a successor list (finger table) instead
andrew11 [14]

Answer:

Chord is a set of rules for a peer-to-peer distributed hash table it collects key-value sets by allotting keys to several computers (known as "nodes"); a node will collect the values for all the keys for which that is reliable. Chord defines how keys are allocated to the nodes, and how a node can determine the value for a distributed key by first locating the node liable for such key.

Explanation:

A chord is a peer-to-peer lookup service. It Resolves the difficulty of establishing a data item in a combination of shared nodes, considering various node arrivals and removals The most crucial operation in most peer-to-peer method is the efficient position of data objects.

It is able of supporting only one operation i.e. given a key, it maps the key on a link.

Algorithm:

Algorithm shows working of the chord:

// x is a node used to find successor of id

x.find_successor(id)

if (id (x; successor])

return successor;

else

// query is being delivered around the circle

entrance successor.find_successor(id);

6 0
3 years ago
What techniques are involved in green computing?
steposvetlana [31]

Answer:  Green computing is the use of computers and related resources which is environmentally responsible. Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.

8 0
3 years ago
Other questions:
  • Write 8 tips for cyber safety
    14·1 answer
  • why is wrong timing, poor technology, bad implementation and politics in business affected the OSI model as a standard
    5·1 answer
  • Which of the following resources is an example of a web-based application?
    15·1 answer
  • The INC and Dec instruction do not effect the__________ flag
    6·1 answer
  • What are the three default security levels within software restriction policies?
    12·1 answer
  • ____ allows you to control how objects enter, move on and exit slides
    13·2 answers
  • An administrator is helping a user connect a smartphone to a tablet via Bluetooth. What should the administrator do first?
    6·1 answer
  • You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on y
    9·1 answer
  • WILL GIVE BRAINLIEST!!!!!!!
    14·1 answer
  • What is the cpu used for
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!