1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
11

Which two fields in an Ethernet frame help synchronize device communica- tions but are not counted toward the frame’s size?

Computers and Technology
1 answer:
sukhopar [10]3 years ago
4 0

Answer:

Preamble and SFD (start frame delimiter) fields help synchronize device communication but are not counted toward the frame's size.

Explanation:

Preamble is a seven byte (56 bits) field which is first field in Ethernet frame followed by SFD (start frame delimiter) which is 1 byte (8bits) long field it marks the end of preamble field and start of Ethernet frame and supports byte level synchronization.

You might be interested in
All living organisms make up the (4 points)
Airida [17]
Biosphere..
hope it helepd
3 0
3 years ago
In vehicles equipped with ABS, the driver's foot must remain firmly on the _________ to activate the ABS.
DanielleElmas [232]
<span>The driver’s foot must remain firmly on the brake pedal to activate the ABS.

An Anti-lock Brake system (ABS) is an effective braking system if used correctly. It simply keeps the foundation braking systems from locking up. It allows the driver to maintain directional stability and in some cases, reduces stopping distances during emergency situations when a driver slams the brake.
The foot of those drivers in vehicles equipped with ABS should remain firmly on the brake pedal, allowing this system to automatically kick in. In case of a slippery road or a panic stop, an Anti-lock Brake system prevents wheel lock up and helps your vehicle maintain a straight line</span>
3 0
3 years ago
Read 2 more answers
Cloud suites are stored on your hard drive and are available anywhere you can access the Internet
puteri [66]
Is that a question or an answer... im confused?!?!

5 0
3 years ago
Complete the implementation of the following methods:__init__hasNext()next()getFirstToken()getNextToken()nextChar()skipWhiteSpac
andrey2020 [161]

From method names, I am compelled to believe you are creating some sort of a Lexer object. Generally you implement Lexer with stratified design. First consumption of characters, then tokens (made out of characters), then optionally constructs made out of tokens.

Hope this helps.

6 0
2 years ago
private members of a class are accessible only from _____________ of the same class or from their friends
maxonik [38]

Answer: Within other member

Explanation:

 The private data member is also known as private function in the computer programming language. The private keyword is basically used to specify the access level and also provide the variable and the methods control to the programmers in the class.

In the class, the variables and the method are directly access by the other methods with the same class but not directly access by the derived class. Therefore, the private members of the class are easily access from the other member of the similar class and also from friends.    

8 0
3 years ago
Other questions:
  • To write on a cd-rw disc, users must have cd-rw software and a cd-rw ____.
    5·1 answer
  • Write the definition of a method printAttitude, which has an int parameter and returns nothing. The method prints a message to s
    8·1 answer
  • Knowing what you know about today’s video games, imagine what it would look like if you had to create a modern-day version of Sp
    6·1 answer
  • A third-grade teacher at Potter Elementary School wants a program that allows a student to enter the amount of money a customer
    14·1 answer
  • Connect 5 LEDs with any random colors. Iteratively, turn ON 1 to 5 LED(s) that will take 5 iterations in total, and in every ite
    6·1 answer
  • When targeting customers of the consumer population at market a product, what type of segmentation information would be most hel
    12·2 answers
  • What is the web of trust
    7·2 answers
  • There are several design goals in building an operating system; for example, resource utilization, timeliness, robustness and so
    11·1 answer
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
  • What Is The First Computer Brought In Nepal ? <br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!