1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nika2105 [10]
3 years ago
13

TRUE OR FALSE: Individuals involved in surveillance prior to a terrorist attack are always well-trained and equipped.

Computers and Technology
1 answer:
eduard3 years ago
5 0
I would say false for sure
You might be interested in
Select the correct answer. Which character type is usually seen more often in games for young children than for the other age gr
garri49 [273]

Answer:

B. Animal

Explanation:

Just took the test on Plato

#PlatoLivesMatter

7 0
3 years ago
Given the variables isfulltimestudent and age, write an expression that evaluates to true if age is less than 19 or isfulltimest
Pani-rosa [81]
Which language is this in?

if (age<19||isfulltimestudent==true)
    return true;
6 0
3 years ago
A hub transmits all incoming messages to all of its ports except the port where the messages came in. A switch usually sends mes
leonid [27]

Answer:

MAC Addresses (Destination and Source MAC address)

Explanation:

A switch has 3 primary functions:

  • Forward frames
  • Learn addresses
  • Avoid loops

An Ethernet frame has the header, data and trailer and there are two specific fields in the header that helps the switch to know where to send data in future transmissions.

  • destination MAC address
  • source MAC address

every Ethernet frame has this and when the frame hits a switch or any device, any device can look at it ( an Ethernet frame ) and know where it is suppose to go and where it came from.

Every switch has a MAC address table where it stores MAC addresses of different computers on the network.

Example:

When a PC1 sends a frame to PC2 through a switch, the switch looks at the header of the Ethernet frame for the source mac address and adds the source MAC address to its MAC address table and also the port that it came through.

simply put:

A switch looks at the source MAC address to see if it knows it already, if it does. Great! no need to add it again to it's address table.

If it doesn't, it adds it's source address and the port that the frame came from.

This basically how the switch populates its MAC address table.

3 0
3 years ago
Read 2 more answers
What are hard ware and software requirments in multimedia computer system
marishachu [46]

Answer:

Some hardware requirement: Monitor, keyboard, mouse, sound card, memory, processor, graphics display card. Some software requirement: Windows XP/Vista, Video for Windows, Quicktime.

Explanation:

BRAINLEST

4 0
3 years ago
How is the numeric string that makes up a digital signature created?
Nat2105 [25]
<span>A numeric string is created by a cryptographic algorithm, which is called a hash that is used to validity of a message or authenticity of a document. The signature is verified by an algorithm that uses the stated owner of the signature's public key to accept or reject the authenticity of a signature. A certification authority's digital signature is used to verify the authenticity of digital certificates and other documents in a PKI.</span>
7 0
3 years ago
Other questions:
  • How would you say an hard drive works
    9·2 answers
  • Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an i
    7·1 answer
  • In regards to storing folders the computer can be described as a ________________.
    7·1 answer
  • The CUSTOMERS and SALES tables contain these columns:
    6·1 answer
  • Now tell me how be rich like Bill Gates
    6·1 answer
  • When entering data in Access if the data is entered using an Access form, that data is stored in a table or tables. TRUE FALSE
    12·1 answer
  • Write code that prints: Ready! userNum ... 2 1 Go! Your code should contain a for loop. Print a newline after each number and af
    6·1 answer
  • Write a program asks the user for an integer N and then adds up the first N odd integers. For example, if the user asks the sum
    11·1 answer
  • State any three reasons why users attach speakers to your computer​
    15·2 answers
  • Suppose in an Excel spreadsheet, the value in cell A1 is 25. By using the Macabacus local currency cycle shortcuts (Ctrl + Shift
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!