1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
14

When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the twisted-pair cable usestransmiss

ions, the receive pair in the cable uses transmissions, and the twisted-pair cable uses transmissions.
a. Simplex, half-duplex, half-duplex
b. Half-duplex, simplex, simplex
c. Simplex, simplex, half-duplex
d. Simplex, half-duplex, simplex
Computers and Technology
1 answer:
zzz [600]3 years ago
7 0

Answer:

C

Explanation:

When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the cable uses SIMPLEX transmissions, the receive pair in the SIMPLEX transmissions, and the twisted pair cable uses HALF-DUPLEX transmissions.

Cheers

You might be interested in
An alteration threat violates information integrity. <br> a. True <br> b. False
Art [367]
The answer is True


It intentionally or unintentionally compromises a system by making unauthorized changes to data. As compared to intentional changes which are usually malicious, unintentional changes are normally accidental. Changes and modifications to the system configurations can also compromise integrity. Such modifications might include deleting, changing, and creating information in a network resource. It is best to implement mechanisms on how one can track and audit such changes as they happen




6 0
3 years ago
Why don't we get together to watch the Academy Awards?
Step2247 [10]

Answer:

idk I'm not sure cause yeah

5 0
3 years ago
Read 2 more answers
Once I install my secondary hard drive what two tasks need to be done?
Vlada [557]
What is the use for the secondary hard drive?

If it is to run another operating system, such as a Linux flavour or another version of Windows, you would need to:

1) correctly format your drive

2) Install your OS

If you are using the HDD alongside your current OS, you need to:

1) Lower the boot priority of that drive in your BIOS

2) Format your hdd for use in your OS.

(Use NTFS for Windows and HFS+ for OS X)
3 0
3 years ago
Which of these are examples of a Single Sign-On (SSO) service?
12345 [234]
Kerberos and OpenID are SSO Services.
5 0
3 years ago
In a relational database, the three basic operations used to develop useful sets of data are:_________.
olga_2 [115]

In a relational database, the three basic operations used to develop useful sets of data are:

\sf\purple{a.\: Select, \:project,\: and\: join. }

\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}

6 0
3 years ago
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • Write a program that requests a state abbreviation as input and displays the justices appointed from that state. The justices sh
    6·1 answer
  • ________ are used to translate each source code instruction into the appropriate machine language instruction.
    11·1 answer
  • Define the ADT list: its properties and methods
    14·1 answer
  • In Android system, an e-mail application that shows a list of new emails, composes an email, or reads an email is called (A) Ser
    9·1 answer
  • Oiê gentee, bom dia O que você entende por cultura digital ??
    12·1 answer
  • Click cell C6 in the Data worksheet and insert a column. Type Series Name in cell C6. Click cell C7 in the Data worksheet and in
    9·1 answer
  • I will mark brainliest
    9·1 answer
  • Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi
    8·1 answer
  • Which language should you use to add functionality to web pages.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!