1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
5

The _________ specifies the station(s) for which the frame is intended. it may be a unique physical address, a group address, or

a broadcast address. select one:
a. da
b. sa
c. sfd
d. preamble
Computers and Technology
1 answer:
Hitman42 [59]3 years ago
7 0
<span>a. DA Given the question and available options, this looks like a question about Ethernet frames. So let's look at the options and see what makes sense. a. DA * DA - Destination address. And the question pretty much defines what it is. So this is the correct choice. b. SA * SA - Source address. This is the physical address that the frame was sent from. And since the question is mentioned who the frame is intended for, this is obviously the wrong choice. c. SFD * SFD - Start Frame Delimiter. This is a special CONSTANT sequence of bits that terminates the preamble. It's purpose is to indicate the start of the frame payload. Since it's a constant value, it does not indicate in any way where the frame is intended to go. So this is a bad choice. d. Preamble * Preamble - is a pattern of alternating 0 and 1 bits intended to synchronize receivers so that the rest of the frame is interpreted correctly. This too is a constant value and as such can't indicate the destination of the frame, so it's a bad choice.</span>
You might be interested in
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
2 years ago
Which area located at the top of the word screen includes home , insert , and page layout ?
Misha Larkins [42]

Answer:

Whats your qeustion

Explanation:

4 0
3 years ago
Read 2 more answers
Which computer can be used where there is no regular electricity?​
alina1380 [7]

Answer:

A mechanical computer

Explanation:

Created from gears and levers

7 0
3 years ago
What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
Katarina [22]
MTA (Mail Transfer Agent)
6 0
3 years ago
What is the full form of RAM. ​
grigory [225]

Random Access Memory

7 0
3 years ago
Read 2 more answers
Other questions:
  • What program controls the hardware and software in a computer?
    10·1 answer
  • Which area of physics governs wireless communication?
    10·2 answers
  • Explain in a few sentences the difference between analytical papers and argumentative papers.
    8·2 answers
  • What outline feature can the Navigation pane browse the document by?
    14·2 answers
  • Which of the following is NOT one of the Big 3 Google Applications that we discussed?
    9·2 answers
  • Which programming element is used by a game program to track and display score information?
    10·2 answers
  • What do you understand by the term polysome?​
    14·1 answer
  • High level language is___________
    15·1 answer
  • Sistem komponen mekanikal yang terdapat pada sebuah basikal?​
    13·1 answer
  • 1) Coding for Table in Html<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!