1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
14

An ethernet switch has a ____ table which is updated by ______.

Computers and Technology
1 answer:
alukav5142 [94]3 years ago
8 0
<span>The ethernet switch connects devices together on a computer network by using packet switching. It is also referred to as network switch.</span>
<span>An ethernet switch has a switching table which is updated by OSPF or BGP.
</span>
<span> The forwarding table contains MAC address table that contains a MAC address and port number. </span>
You might be interested in
What is the best definition of a network?
Cerrena [4.2K]

Answer:

C is the answer to this question.

3 0
3 years ago
Read 2 more answers
When viewing data entered into a spreadsheet, the columns identify _____.?
AlexFokin [52]
The answer is : variables
When viewing data entered into a spreadsheet, the columns identify Variable. The variables later can be used on a formula to help you process any sort of data that is implemented within excels' formula system
3 0
4 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
3 years ago
What is the output when you run the following program? print(3 + 7) print("2 + 3")
QveST [7]

print(3+7) will output 10, which is an integer.

print("2+3") will output 2+3, which is a string.

6 0
3 years ago
Discuss Batch Processing clearly showing the advantages and disadvantages
vazorg [7]

Answer:

Batch Processing is the processing of previously collected jobs in a single batch.

Explanation:

Some advantages would be that a data center's staff can schedule batch processing during times when the computers are otherwise idle, such as overnight, The computer operators can delay or prioritize different batches easily, and computer files containing commands, programs and data; once created, some can be run repeatedly as needed, adding convenience for the staff and helping keep processing costs low.

Some disadvantages would be that all of a batch job's input data must be ready before the computer can run it, problems with data, errors and program crashes that occur during batch jobs bring the whole process to a halt, and the inputs must be carefully checked before the job can be run again.

https://www.techwalla.com/articles/advantages-disadvantages-of-batch-processing

5 0
3 years ago
Other questions:
  • In Python Calculate the BMI of a person using the formula BMI = ( Weight in Pounds / ( ( Height in inches ) x ( Height in inches
    9·1 answer
  • Consider the following sequence of items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert these items in the order above,
    5·1 answer
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    5·1 answer
  • How do you make the task bar and e-mail read in larger print
    13·1 answer
  • 1000base-t is a standard for achieving throughputs ____ times faster than fast ethernet over copper cable.
    8·1 answer
  • What is the use of jacquard loom
    13·2 answers
  • The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they
    5·2 answers
  • 14. Which of the following information about the ESRT T-teen rating rating is FALSE?
    15·1 answer
  • which two functions are performed at the llc sublayer of the osi data link layer to facilitate ethernet communication? (choose t
    13·1 answer
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!