1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
3 years ago
15

"A switch passes data based on the MAC address."A. TrueB. False

Computers and Technology
1 answer:
Maru [420]3 years ago
8 0

Answer:

A. Ture

The switch keep track where computers are connected to bus based on there on there MAC address and only forward traffic if computers that communicate are in another zone in this case on other side devices on an ethernet network will not detect or notice the network switches for computers the switches are transparent

You might be interested in
Memory cache is referred to as ______. A. SRAM c. SROM b. DRAM d. DROM
Dafna11 [192]

Answer:

Answer is A. SRAM

Explanation:

Memory cache is called static RAM.

7 0
4 years ago
HELP PLEase!!! Which option is an outcome of a project stated in quantifiable terms?
dimulka [17.4K]

Answer: C) a 10 percent increase in efficiency of sales of a particular product line over one year

The term "quantifiable" means that we can attach a number to it. Specifically, a number in which we can do math operations upon it. Something like telephone numbers or serial numbers don't really count as quantifiable entities. They are qualitative variables instead. So you have to be careful what numbers you run into. In this case, "10 percent increase in efficiency" is quantitative and fits what we're after.

A 10% increase corresponds to the multiplier 1.10; for instance, if you had sales of 40 million dollars one year, then a 10% increase is 1.10*40 = 44 million in sales. This is one example where we apply a math operation (specifically multiplication) on the value in question.

4 0
3 years ago
You found an image on the Creative Commons that you would like to use. How do you give credit to the author? *
Archy [21]
You need to write the author’s name
7 0
3 years ago
Read 2 more answers
How many Megabytes are there in a Gigabyte?
Tju [1.3M]
<span>
In quantities of data,
"kilo" = 2^10 = 1,024
"mega" = 2^20 = 1,048,576,
"giga" = 2^30 = 1,073,741,824 .

<span> <span /></span></span> <span>1 gig = 1,024 megs<span><span /></span></span>


7 0
4 years ago
The Windows Group Policy feature provides __________ that govern the way Windows operates in enterprise environments. a. a centr
WITCHER [35]

Answer:

a.

Explanation:

The Windows Group Policy feature provides a centralized set of rules that govern the way Windows operates in enterprise environments. The Windows Group Policy is found in every single Microsoft Windows operating system, and fully controls the working environment of user accounts and computer accounts. This feature allows the user to manually make restrictions and changes such as blocking access to certain sections of the Windows control panel or setting a specific website as the home page for every account on the network.

4 0
3 years ago
Other questions:
  • The intersection of a row and a column is commonly called what?
    15·1 answer
  • Each character in a string has a(n) _______________ which specifies its position in the string.
    13·1 answer
  • True or false A thesaurus is a brunch of commands grouped together as a single command used to automate task
    15·1 answer
  • The word count of the active document is typically displayed on the ________.
    15·1 answer
  • The good example of pivoting is changing thedimensions along the axis.? True? False
    9·1 answer
  • A major problem with alcohol adverstising is that
    15·1 answer
  • You work part time at a computer repair store. You are in the process of building a new computer system. The customer wants a mo
    6·1 answer
  • A network administrator enters the service password-encryption command into the configuration mode of a router. What does this c
    11·1 answer
  • Select the correct answer.
    14·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!