1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kruka [31]
3 years ago
10

Which layer concerns the gateway to the network?

Computers and Technology
1 answer:
elena-s [515]3 years ago
4 0
The gateway works at the network layer is the Layer 3 of the OSI Model. The door is utilized when transmitting parcels. At the point when parcels are sent over a system, the goal IP address is inspected. On the off chance that the goal IP is outside of the system, then the bundle goes to the door for transmission outside of the system.
You might be interested in
A(n) __________ can include a computer's full operating system, applications, and system settings, including security and config
babymother [125]

Solution:

It is done by Operating system.

An Operating system is system software that manages computer hardware and software resources and provides common services for computer programs.

Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.


5 0
3 years ago
A test for logical access at an organization being audited would include: Group of answer choices Checking that the company has
bogdanovich [222]

Answer:

Testing that super user (SYSADMIN) access is limited to only appropriate personnel.

Explanation:

A test for logical access at an organization being audited would include testing that super user (SYSADMIN) access is limited to only appropriate personnel.

8 0
3 years ago
Janet has to prepare a presentation on business strategies for work. Which guideline should she follow to create an effective pr
Tpy6a [65]

d.....................................


7 0
3 years ago
Read 2 more answers
Virtual Memory involves swapping between which 2 devices?
Darina [25.2K]

Answer:

Ram and the hard drive

Explanation:

A page of RAM is written to the harddisk and read back when it is needed again. That way it may seem you have more RAM than you actually have, at the cost of performance of course.

6 0
3 years ago
Which of the following are true of e-mail communications when compared to phone or face-to-face communications?
ollegr [7]
They would be easily shared, from what I believe
7 0
3 years ago
Read 2 more answers
Other questions:
  • You would like to know how many cells contain data. Which function should you use? COUNT MIN SUM ABS
    14·1 answer
  • Whenever I go onto Google Chrome, the words are in Spanish! How can I make the words be back in English again? Please let me kno
    7·1 answer
  • HURRY UP NEED HELP!!! What are examples of curricular education? Check all that apply.
    9·2 answers
  • Peripherals can be used to output information.<br> True<br> False
    9·2 answers
  • Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
    8·2 answers
  • Linda wants to apply for a job in a company of her choice. Which information would her potential employers likely review in her
    10·2 answers
  • There are ___ Federal Reserve Banks. Each bank is also in charge of its assigned District Banks.
    10·1 answer
  • What would be the total width of the div in the code below?
    11·2 answers
  • What is the d/c b/n information rich and information poor society​
    13·1 answer
  • Which sentence describe internet safety precautions?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!