1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Travka [436]
3 years ago
5

Bob wanted to buy a computer network component from the local electronics store. The attendant said that the device Bob wanted i

s now obsolete and being replaced by routers and switches. Which device is the attendant referring to?
hubs

modems

network interface cards (NIC)

gateways
Computers and Technology
2 answers:
shepuryov [24]3 years ago
7 0
Network interface cards (NIC)
Stolb23 [73]3 years ago
4 0
He would be referring to a NIC due to the fact that most computers these days use wireless internet connections.<span />
You might be interested in
What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply.
viva [34]

All options in the Advanced tab in the Share Workbook dialog box.

  • Don’t keep change history
  • Show comments made by all users
  • Update changes when file is saved
  • Track changes for certain amount of days
  • Allow changes by more than one user at a time
  • Automatically update changes in certain time periods

<u>Explanation:</u>

In shared workbook in advanced tab it has following options. Based on end user selection changes are applied on shares workbook.

1. Either keep the history for certain period or don’t keep the history on shared workbook.

2. On share work Save changes on period schedule (automatically update) or just see other user changes.

3. Before changes are made for share workbook either prompt for save option or last modified saved.

4.  Printer review and filter setting for personal view.

8 0
3 years ago
Read 2 more answers
You have been tasked with training end users in security best practices and have observed a trend among users in which many are
quester [9]

Hi, A Tech-Savvy here.

Answer:

(C) Lengthen the time period between forced password changes.

7 0
3 years ago
When is it appropriate to utilize the nat network connection type?
lbvjy [14]
Whenever the VM does not need to be access at a known address by other network nodes.
6 0
3 years ago
how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address
jonny [76]

Answer:

The answer is "14".

Explanation:

Let the IP address = 196.45.204.0

When it borrowed 4 bits

\therefore\\\\ subnet = 28

IP=  \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000

If the borrowed bits are left out then:

The Number of useable host addresses:

= {(2^4) - 2} \\\\ = 16-2\\\\ =14

3 0
3 years ago
What happened to price during the month of September 2018
torisob [31]
The prices went up alot because of taxes
6 0
4 years ago
Other questions:
  • If it can be applied, the least-damaging recovery option is ________.
    10·1 answer
  • In a distributed database system, the data placement alternative with the highest reliability and availability is Group of answe
    9·1 answer
  • Explain what happens if you try to open a file for reading that does not exist.
    10·1 answer
  • In order for the image tag in an HTML file to function properly, the file named square.png must be located where?
    5·2 answers
  • What is the Microsoft excel window where you work on. And it composed of three worksheet?​
    7·1 answer
  • The technology dealing with robots is called
    6·1 answer
  • what will allow you to immediately exit the program without rebooting the computer, when you realize your browser is not respond
    7·1 answer
  • Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. Wh
    13·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    14·1 answer
  • At a family reunion, your cousin takes a picture of both of you with her phone, orders a print of it, and mails it to you with a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!