1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
forsale [732]
3 years ago
12

At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?

Computers and Technology
1 answer:
Natalka [10]3 years ago
6 0

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

You might be interested in
Assume that a program uses the named constant PI to represent the value 3.14. The program uses the named constant in several sta
mihalych1998 [28]

Answer:

The advantage for the above condition is as follows:-

Explanation:

  • If a user creates a defined constant variable and assigns a value on its and then uses that variable instead of the value, then it will a great advantage.
  • It is because when there is a needs to change the value of that variable, then it can be done when the user changes the value in one place. There is no needs to change the vale in multiple places.
  • But if there is a value in multiple places instead of a variable and there is no constant variable, then the user needs to change the value in multiple places.
7 0
3 years ago
15. How many PC’s can be connected to a UPS?
Alex_Xolod [135]

Answer: Depends on the power of the computer /computers and the UPS

Explanation: For someone who had a big connected network of computers and printers we would plug the computer or server into the UPS as well as the monitor and sometimes a printer sometimes the monitor was plugged into the wall

When you get a UPS you must plug it in for a certain time could be hours or even a day.  A USP has a big battery in it and you must charge it (sometimes it comes semi-charged but you must plug it in to strengthen it. )

there are two connector wires that you affix to the battery and you must put a lot of strength into it to make it secure.

So in closing, you can get away with two like a desktop and a laptop.

Read your documentation that comes with the UPS

6 0
1 year ago
Place the following discoverers in the correct chronological order of the timeframe for their discoveries, from earliest to most
Alex787 [66]
The correct order or answer is the 2nd choice.

Pythagoras, Gauss, Edison, Hawking. The following are the most noted discoveries of each.

Pythagoras, 500 B.C. School Of Mathematics and Pythagorean theorem.Edison, Year 1879 - Invention of incandescent light bulb.Gauss, Year 1801 - Therom of Alegbraic Solution. Stephen Hawking Year1980 - Studies in cosmology particularly contributing to the context of black holes.
5 0
3 years ago
Carlie was asked to review a software prject for her company and determine what materials are needed. Whihc part of project mana
Helga [31]

Answer:

The answer is "Resources".

Explanation:

All services should definitely be reviewed through Carlie. However many Software Developers, Reviewers, and others are accessible are important to find out. Only then can Carlie find out because needed, the exact timelines. Because whenever establishing precise deadlines, she needs to take a look at the tools, that's why the above given choice is correct.

8 0
3 years ago
A technician is building a thick client workstation that would be used to run a database and wants to ensure the best protection
Alexxandr [17]

Answer: ECC (Error-correcting code) memory

Explanation: Error correcting code memory is the memory that has the capability of detection and correcting the error arising in the data.The internal data is the most effected data from the corruption and damage.It is the memory used in the computer and other operating system because it has less tolerance towards data corruption.

The technician should use the ECC memory for the building of the client station.This will protect the system and the data from getting in any circumstance.

6 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
    6·2 answers
  • Directions for starting the computer and opening a word processor document
    5·1 answer
  • Windows needs free space on the hard drive for normal operation, for defragmenting the drive, for burning CDs and DVDs, and for
    11·1 answer
  • What is the name of the file manager in Microsoft Windows. The file manager used in Microsoft Windows is?
    12·2 answers
  • #include #include int main( ) { int value = 10; int pid; value += 5; pid = fork( ); if (pid > 0 ) { value += 20; } printf(val
    10·1 answer
  • 6. At age 17, what was Minhaj's definition of the American Dream?
    8·1 answer
  • Can i get some help please .
    5·2 answers
  • How to convert binary to decimal <br> Please it’s so hard and what is digital and analogue
    9·1 answer
  • Fill in the blank
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!