Multitasking is a myth—everyone can only process information one piece at a time.
Answer:
Port security and violation mode.
Explanation:
A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.
The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.
The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.
Answer:
the last one
Explanation:
the domain specifies exactly what file is requested the path specifies where the browsers request should be sent
Answer:
it is. Describing the requirements for how a program will work or users will interact with it
Explanation:
mark brainlist