1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ArbitrLikvidat [17]
3 years ago
6

Help please fast

Computers and Technology
2 answers:
LUCKY_DIMON [66]3 years ago
6 0

Answer:

The answer is footnote on edg 2020

Explanation:

Pachacha [2.7K]3 years ago
4 0
Bookmark because you can go back to it at any given time to re use it
You might be interested in
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
2 years ago
1
max2010maxim [7]

Answer:Go to the location where you want to save the file.

Explanation:

8 0
4 years ago
What are the uses of DVD Ram​
Verdich [7]

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

4 0
3 years ago
Read 2 more answers
What is security in Technology<br>​
maria [59]

Answer:

IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.

3 0
4 years ago
Read 2 more answers
What are some examples of duties Information Support and Service workers perform?
Tanzania [10]

Answer:

3

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • How do all apple phones work?
    7·1 answer
  • According to many experts how often should files be backed up
    12·2 answers
  • you'll be organizing the various databases in your organization, and have recommended hiring a/an?A. internet specialist B. comp
    6·2 answers
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • Jamie is preparing a presentation on his laptop for his college annual event. He inserts audio and video files into the presenta
    11·2 answers
  • Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po
    6·2 answers
  • Identify the characteristics of logic problems.select all that apply
    5·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • What settings are available in the Properties dialog box of a message? Check all that apply.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!