1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
3 years ago
11

Which computer network component allows data transfers from one computer to another through a telephone line?

Computers and Technology
2 answers:
coldgirl [10]3 years ago
7 0
A Router transfer data packets from one node to another node in a network.
Genrish500 [490]3 years ago
5 0

*****ON PLATO*****

Dennis answered that it was a modem. Is the correct answer.

You might be interested in
Communication among office computers is based on a protocol that uses CRC-32 for error detection. A series of 100 identical test
Fiesta28 [93]
I think it is the CRC-32 for error detection
4 0
3 years ago
The purpose of a switch______link is to be able to carry the traffic for all local VLANs.
alekssr [168]

Answer:

Inter switch link

Explanation:

It is the inter switch link( ISL) that enables to carry the traffic for all local VLANs. Functions of VLANs are firstly, a VLAN allows us to take one physical switch, and break it up into smaller mini-switches. Secondly, every virtual switch, called VLAN, is simply a number assigned to each switch port.

6 0
3 years ago
Phil wants to add a new video card, and he is sure the power supply is sufficient to run the new video card. But when he tries t
pshichka [43]

Answer:

Using a SATA to a 6 pin PCI-E adapter.

Explanation:

sometimes you may feel the need to make some upgrades to your computer, video cards are options where an upgrade is made, a 6 Pin PCI-E adapter is 6 pins 12V power adapter used to power a video card where their slots cannot provide them with enough power they require. in a situation where the card requires a lot of power than the slot can provide, 6 pins PCI-E adapter is a very good option.

4 0
3 years ago
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
3 years ago
What is basically the only thing that computers (microprocessors and prgrammable devices) understand?
horsena [70]

Answer:

Binary Code

Explanation:

All microprocessors and programmable devices understand is Binary Code. These are various combinations of 0's and 1's which when placed together in a sequence represent a set of instructions that the microprocessor can read and understand to complete complex tasks. There are various other programming languages to program these tasks in an easier to read syntax for the programmers themselves but they simply take the written code and convert it into Binary before sending it to the microprocessor.

4 0
2 years ago
Other questions:
  • When did the silver market drop sharply, hurting Bolivia's income?
    7·2 answers
  • What type of computer is likely to use so-dimms, have an internal power supply, and use a desktop processor socket?
    10·1 answer
  • The term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.
    5·1 answer
  • Meaning of page break​
    8·1 answer
  • A process that rearranges the data and objects in a database to decrease its file size, thereby making more space available on y
    11·1 answer
  • write a C program the prints out the size of variables with the following C data types- int, long, unsigned, long long, double,
    7·1 answer
  • One of the disadvantages of cable technology is that: while it works well for television signals, it is ineffective for data tra
    8·1 answer
  • What is htc one mseven​
    11·1 answer
  • Features of Python are *
    9·1 answer
  • Which of the following boxes should replace question mark
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!