1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
7

Match each label to its description.

Computers and Technology
2 answers:
tester [92]3 years ago
4 0
1)B
2)C
3)A

That’s probably right
Brut [27]3 years ago
3 0

1 and B

2 and C

3 and A

I think this is correct

You might be interested in
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
3 years ago
Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
Alona [7]

Answer on https://pastebin.com/raw/nHzXvbPP

4 0
3 years ago
Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
steposvetlana [31]

Answer:

Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.

High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.

So,Yes bit stuffing is necessary in control field.

7 0
4 years ago
Which of the following are parts of the Physical Layer?
Snowcat [4.5K]

Answer:

Physical layer is the first layer of OSI model.  The detail about physical layer and its parts is given below in explanation section.

Explanation:

The physical layer is the lowest and first layer of the Open Systems Interconnection Model (OSI). The physical layer is used for the transmission of data in bit forms. For transmission of data between devices, it uses the transmission medium that is either wired or wireless.

In the wired cable the component of the psychical layer include cable and connectors that are implemented for carrying data from one place to another or simply to transmit data between two connected devices. The wireless transmission medium is used to transmit data in the form of electromagnetic signals for carrying data into a stream of bits. Over past advancements in networking technologies, rapid growth has been seen in wireless data transmission and Wi-Fi and Bluetooth communication are few names of it.

Components/Parts of Psychical Layer

In the physical layer, the hardware components used it in are the network interface cards, connectors and interfaces, intermediate devices, modems, and cables to facilitate the transmission of data between devices or from source to destination.

  • The network interface card (NIC)

NIC is a component installed in the computer to connect it to any available devices over the network.

  • Connectors and Interfaces

Connectors and interfaces are used to connect cables that are being used for transmission of data from one source to another. The decision to choose connectors and interfaces depends on the type of cable. Typical examples are RJ-45, RJ-11, V.35, HDMI, etc.

  • Cables

Cables are the physical components of the physical layer that carry optic or electromagnetic signals for transmission of data from source to destination in the network.

  • Intermediate devices

The intermediate devices are hubs and repeaters etc. The functions of these devices are to amplify or generate the signal at the intermediate point in a network.

6 0
4 years ago
Determine if the following identifiers are valid. If they are invalid, state the reason. For example, the identifier min value i
Natasha2012 [34]

Answer:

Explanation:

Determine if the following identifiers are valid. If they are invalid, state the reason. For example, the identifier min value is invalid as it uses a whitespace.

road

mid_point

8ball

break

_log_value

EVERY1

[email protected]

_log

NewNumber

$varA

class

4 0
3 years ago
Other questions:
  • Where is the brightness and contrast changed at?
    10·2 answers
  • Clicking on this will minimize all open windows.
    5·2 answers
  • Which of the following statements is false? Group of answer choices A subclass is often smaller than its superclass. A superclas
    12·1 answer
  • Assume a TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends 120 bits of h
    14·1 answer
  • Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in
    11·1 answer
  • Love me love me say that u love me fool me fool me go on and fool me : ) answer the question thx
    6·2 answers
  • Match the image to the view type in a presentation program. scroll bar tool bar status bar menu bar provides an array of buttons
    10·2 answers
  • Can i get some help please .
    5·2 answers
  • An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
    15·1 answer
  • True or false: big data is a collection of large, complex data sets, including structured and unstructured data, which cannot be
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!