1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vilka [71]
3 years ago
9

Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro

duced by A when “$” is sent. Also mention the OSI layer that is responsible for this. (Note: double quotes are not included, only $)
Computers and Technology
1 answer:
storchak [24]3 years ago
5 0

Answer:

Physical and data link layer.

Explanation:

The ethernet cable is used at the physical layer. The physical layer consists of hardware components. This layer is responsible for transmission of data bits between two nodes via a physical wire. The data link layer provides the means in which data packets are transmitted from one node to another.

Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the packets would be sent from computer A to computer B if computer B is free if not it would wait until computer B is not transmitting before it can start sending data packets to computer B.  

You might be interested in
What is a fax machine used for
pickupchik [31]

Answer:

A fax machine is used to send documents over a phone network.

Explanation:

The transmission that is sent is called "Faxes"

The easiest way to understand this is by having one person print a document at someone else's house. It is also a live time like a telephone, or like a text message.

4 0
3 years ago
You are the system administrator for a medium-sized Active Directory domain. Currently, the environment supports many different
Bogdan [553]

Answer:

All the Above

Explanation:

Domain local groups, global Groups, Universal Security Groups all these 3 groups can be used.

7 0
3 years ago
What is the best wi-fi name you have ever seen?
elena-s [515]

Answer:

bill wi the science fi

Explanation:

8 0
3 years ago
Operands may be any of the following: (select all that apply) Group of answer choices constant or constant expression register n
attashe74 [19]

Answer:

constant or constant expression

register name

variable name (memory)

Explanation:

Literally, operand means data which an operation can be performed on. The operation could be an arithmetic or logical operation.

From the list of options, several operations can be performed on:

  • constants e.g. \pi = 3.14
  • registers and
  • variables e.g. (a + b)

<em>However, no operation can be performed on keywords and/or reserved words.</em>

3 0
3 years ago
The concepts of ________________, _________________, and _________________ for covert acts are pivotal to understanding state-on
DIA [1.3K]

The concepts of Power, anonymity and political utility for covert acts are pivotal to understanding state-on-state interactions within cyberspace.

<h3>What is Anonymity?</h3>
  • Anonymity describes cases where the interim person's identity is anonymous.
  • Some writers have argued that anonymity, though technically accurate, does not capture what is more centrally at stake in contexts of anonymity.
  • The essential concept here is that an individual is non-identifiable, unavailable, or untrackable.
  • Anonymity is seen as a technique, or a way of realizing, sure other values, such as solitude, or liberty.
  • Over the past few years, anonymity tools used on the dark web by offenders and harmful users have drastically changed the ability of law enforcement to use conventional surveillance Techni.

To learn more about Anonymity, refer to:

brainly.com/question/28115737

#SPJ4

3 0
1 year ago
Other questions:
  • What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
    12·2 answers
  • What are language standards? At this point in your study of programming, what do they mean to
    5·1 answer
  • Which of the following is the best example of a manager with a delegator leadership style
    10·2 answers
  • You have found an old dusty computer in your basement that you can identify as an original IBM PC. You ask your friend if he kno
    13·1 answer
  • A database interrogation is a major benefit of the database management approach, where end users can query (“ask”) the database
    6·1 answer
  • Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
    6·1 answer
  • Which professionals can benefit from an understanding of statistics? Check all of the boxes that apply. magician trying to locat
    5·2 answers
  • What is the best way to use copyrighted material?
    14·2 answers
  • Where did the name "QWERTY" come from?​
    9·1 answer
  • The web design teams of a company are working on designing websites for various companies, Pick the ideas that employ proper use
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!