1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
11

Which two fields in an Ethernet frame help synchronize device communica- tions but are not counted toward the frame’s size?

Computers and Technology
1 answer:
sukhopar [10]3 years ago
4 0

Answer:

Preamble and SFD (start frame delimiter) fields help synchronize device communication but are not counted toward the frame's size.

Explanation:

Preamble is a seven byte (56 bits) field which is first field in Ethernet frame followed by SFD (start frame delimiter) which is 1 byte (8bits) long field it marks the end of preamble field and start of Ethernet frame and supports byte level synchronization.

You might be interested in
(TCO B) The symbol shown as a three-sided box that is connected to the step it references by a dashed line is what?
xxTIMURxx [149]

Answer:

Annotation symbol.

Explanation:

A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

A symbol shown as a three-sided box in a flowchart, that is connected to the step it references by a dashed line is known as an annotation symbol.

This ultimately implies that, it provides additional information in the form of remarks or comments with respect to the steps in a flowchart.

8 0
3 years ago
Calculate the resistance of an unknown resistor in a circuit with 30 volts and 6 amps. The formula is R = V/I.
arsen [322]
The answer is 5 ohms
7 0
2 years ago
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
3 years ago
Some of the latest smartphones claim that a user can work with two apps simultaneously. This would be an example of a unit that
SIZIF [17.4K]

Answer:

MULTITASKING OS

Explanation:

MULTITASKING OPERATING SYSTEM is an operating system that enables and allow user of either a smartphone or computer to make use of more that one applications program at a time.

Example with MULTITASKING OPERATING SYSTEM smartphones user can easily browse the internet with two applications program like chrome and Firefox at a time or simultaneously

Therefore a user working with two apps simultaneously is an example of a unit that uses a MULTITASKING OS.

3 0
2 years ago
What is a limitation of the flash memory card select one of the options below as your answer:
Inga [223]
The answer is C. You can only use it with the correct memory card reader.
4 0
3 years ago
Other questions:
  • What is another name for “low-angle lighting”? Side lighting Top lighting Under-lighting Three-point lighting
    15·2 answers
  • An ______ is a simplified image. [4 letters]​
    7·2 answers
  • Which of the following is a sigh that your computer may have been infected with malicious code
    12·1 answer
  • The camera on a phone or laptop can be used to track a user's eye movements. Which of these is NOT one of the possible applicati
    13·1 answer
  • The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future
    13·1 answer
  • How do you get banned? By getting reported? Or do admins watch whats posted?
    9·1 answer
  • What command would you use to add a file to an e-mail message?
    15·2 answers
  • True false.
    10·2 answers
  • Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Referenc
    7·1 answer
  • What variation pairs a new employee with an employee who has been with the company for 20 years?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!