1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
forsale [732]
3 years ago
12

At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?

Computers and Technology
1 answer:
Natalka [10]3 years ago
6 0

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

You might be interested in
Within the sites that support disaster recovery, ___________ is a separate and fully equipped facility where the company can mov
Dahasolnce [82]

Answer:

Hot site.

Explanation:

It seems to be a specific and completely designed functionality inside the sites which assist disaster recovery, in which the organization may travel directly during a disaster as well as continue operations.

  • It may be described as such a recovery site that is repeatedly fully operational.
  • It enables the corporation to resume normal corporate processes during a disaster, within such a limited period cycle.
7 0
3 years ago
Part of preforming routine computer maintenance includes
omeli [17]
Cleaning And tidy cords
7 0
3 years ago
Read 2 more answers
Which of the following resources is an example of a web-based application?
kompoz [17]
The answer will be google docs since it depends on a web and its an application. hope it helps

3 0
3 years ago
1.<br> The correct way to use a seat belt is
Nesterboy [21]

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

4 0
3 years ago
A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to creat
antiseptic1488 [7]

Answer:

The tool that allows to configure a custom console is "mmc.exe".

Explanation:

MMC is a Microsoft Management Console. It is used to customize the management console and add the tools in console that are required by the technician.

3 0
3 years ago
Other questions:
  • Is a network traffic management device used to connect different network segments together?
    9·1 answer
  • Click to move a stacked object to the top of the stack?
    8·1 answer
  • 0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8
    7·1 answer
  • Plz help me of this answer<br><br><br>language:python​
    7·2 answers
  • Which of the following statements is used to terminate the program when closing the frame?
    5·1 answer
  • Which of the following is false about arrays? Group of answer choices
    15·1 answer
  • If a citation has a volume, title, and page numbers, it is a:
    9·2 answers
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
  • What was the name of the first computer, developed by charles babbage?.
    7·2 answers
  • You work part-time at a computer repair store. You're building a new computer. The customer has requested two serial ATA (SATA)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!