1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
3 years ago
5

Which protocol resolves logical addresses to physical addresses?

Computers and Technology
1 answer:
OLga [1]3 years ago
4 0
The answer to this is ARP
You might be interested in
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
Zielflug [23.3K]

Answer:

Option (B) i.e., Hash is the correct option.

Explanation:

A hash value is the number that has the fixed length and the data recognition is uniquely. It is also a type of file that is read by the special type algo, it uses the value of the bits in the following computer files which is used to manipulates the single number. That's why the following option is correct.

7 0
4 years ago
3.6 Code Practice on Edhesive
Alchen [17]

I've included my code in the picture below. Best of luck.

6 0
3 years ago
Carbon monoxide poisoning can result from breathing
Mamont248 [21]
The answer is the letter a
6 0
3 years ago
What term is used to describe a list of security policies that is associated with an object?
Artemon [7]

Answer:

An Access control list (ACL) is used to describe a list of security policies that is associated with an object

5 0
4 years ago
What types of storage can be used to access your data on a another computer
vladimir1956 [14]
1. Cloud Storage, such as dropbox or Google drive,
2. Network attached storage, where all your data is stored on a central NAS, and you can access it in Windows explorer or Mac Finder
3 Data on flash drive or on an external hard drive.
3 0
3 years ago
Other questions:
  • Pointsyour company environment includes windows server versions 2003, 2008, and 2012. desktops range from windows xp and vista.
    13·1 answer
  • What is the term for sending emails that imitate legitimate companies?
    6·2 answers
  • What is the term for a calculation (using encryption technologies) based on the contents of a disk or file that are engineered s
    8·1 answer
  • The _device provides a means of communication between a computer and outer world.​
    14·1 answer
  • Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running ver
    10·1 answer
  • How ssd is better than normal sata and pata HDD​
    11·1 answer
  • How do you customize calendar view​
    9·2 answers
  • Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a
    10·1 answer
  • HURRRY WILLL GIVE BRAINLIST!!!!!!
    12·1 answer
  • Which of the following is an operating system?<br> MacBook Air<br> Windows 10<br> Dell
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!