1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
forsale [732]
3 years ago
12

At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?

Computers and Technology
1 answer:
Natalka [10]3 years ago
6 0

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

You might be interested in
In what ways are computers being used to improve our quality of life
Helga [31]

Answer:

  • computers help with our education system
  • communicating with others is easier (emails/text messages opposed to sending an envelope)
  • technological advances

5 0
3 years ago
Read 2 more answers
1. The________  member function moves the read position of a file.
emmasim [6.3K]

Answer:

Answers explained with appropriate comments

Explanation:

1. seekp()   //the seekp sets the position where the next character is to be   //inserted into the output stream.

2. fstream  //fstream is used for input and output for files

//just like iostream for input and output data

3. tellp();  //tellp returns the "put" or write position of the file.

4. ios::ate  //ate meaning at the end, sets the file output at the file end

5. binary files  //binary files only store 0s and 1s

6. seekg()  //seekg is used to move write position of the file

7. put  //this is used to "put" or set records or arrays to a single file

8. std::ws , skips //the std::ws is used to discard leading whitespace from an //input stream

9. peek //this looks at the next character in the input sequence

10. get, peak //get and peek do not skip leading whitespace characters

8 0
3 years ago
Consider two decision problems X and Y. If X reduces in polynomial time to 3-SAT and 3-SAT reduces in polynomial time to Y. Whic
tekilochka [14]

Answer:

X is in NP and Y is in NP-HARD ( A )

Explanation:

X is in NP and Y is in NP-HARD can be inferred from the previous statement made in the problem above because  problem decision X  can be in NP if it can BE reducible to a 3-SAT polynomial real time, if that can be achieved then  3SAT will be in NP since SAT is in NP as well.

also problem decision Y  can be in NP-HARD if 3SAT can be reducible to it in polynomial time as well hence option A is the correct option

8 0
3 years ago
A ____ resembles a circle of computers that communicate with each other.
Sidana [21]

Answer:

ring network

Explanation:

In a ring network, the nodes are arranged in a circular pattern where each node is connected to two adjacent nodes. In this topology, any node can communicate with any other node via the intermediaries.

In comparison,

- in a star network every communication needs to pass through a central hub node

- in a bus, each node is connected to a shared linear communication bus.

- in a hierarchical network nodes are organized along a tree structure layout.

4 0
4 years ago
How to screen shot on a computer
raketka [301]
To take a screen shot press the 'prt scn' button
stands for print screen. this screen shot is then put in the clipboard for pasting
6 0
3 years ago
Other questions:
  • Calculate the shear stress (lbf/in^2) for a given normal stress (lbf/in^2) that is applied to a material with a given cohesion (
    15·1 answer
  • State two ways a local area network can be used to monitor the work of employees
    11·1 answer
  • 1A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The
    5·1 answer
  • MICR is an input or output devices
    5·1 answer
  • What happens if i unplug my alarm system?
    11·1 answer
  • Hello! I hope you have a great day! Good things will come your way.
    12·1 answer
  • What function does a resource manager in an IDE perform?
    14·1 answer
  • What kind of company would hire an Information Support and Service employee?
    8·1 answer
  • [80 points] Fill in the missing word.
    14·1 answer
  • Data erasure software uses standards that are called.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!