1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BabaBlast [244]
3 years ago
14

Which device is similar to a hub but can isolate groups of devices on a network?

Computers and Technology
1 answer:
alexdok [17]3 years ago
5 0

Answer:

Router

Explanation:

A hub is so similar like a switch, but a switch is smarter than the hub because can be to know what port is connected, but is this particular question we have a router like options, this is the smartest of the three options because we can segregate and isolate groups of the device on a network, this is the most complex to use of the three option because we have to make some settings like the DHCP.

You might be interested in
For which of the following is a bulleted list more appropriate than a numbered list?
Vedmedyk [2.9K]
THE ANSWER IS A!!!!!!!!!!!!!!!!!!!
5 0
3 years ago
Please Help!
Alex787 [66]

The three default components listed in the inspector view of a terrain assets are: Terrain, Terrian Collider  and Texture.

So the answer is Transform.

If you use the Move tool then click and drag an object while holding CTRL and Shift at the same time, it will snap the object to intersection points of the Collider; allowing stacking of objects automatically.

So the answer is Stack objects automatically.

3 0
3 years ago
Read 2 more answers
The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.A. True
Zarrin [17]

Answer:

B. False

Explanation:

Sarbanes-Oxley Act or SOX also known as the Public Company Accounting Reform and Investor Protection Act and Corporate and Auditing Accountability, Responsibility, and Transparency Act is a United State federal law that creates or modify requirements for U.S public company board, management and public accounting firm. some of its policies are meant for private companies as well.

This act does not restrict any electronic and paper data containing personally identifiable financial information.

6 0
3 years ago
Create a new method in your language called Times Print. This should be a void method. It should accept exactly two numeric valu
user100 [1]

Answer:

The code commented is given below, also the lines that start with # are comments that explains the code.

# Create a function named times_print that receives 2 values x and y

def times_print(x, y):

   # Print the formatted string

   print("The value of {} times {} is {}".format(x,y,x*y))

# Create the main function

def main():

   # Call the funciton times_print 3 times with different values

   times_print(2,3)

   times_print(4,5)

   times_print(5,6)

# Execute the main function

main()

Explanation:

The code was written using Python 3.5, and here I attach the screenshots of the program running:

8 0
3 years ago
What can we do to positive interaction online?
Julli [10]

Answer:

We can help eachother out with things.

Explanation:

Eg. Schoolwork and homework because our stress level will decrease.

8 0
3 years ago
Read 2 more answers
Other questions:
  • To save the changes to the layout of a table, click the Save button on the _____.
    13·1 answer
  • Five computers are connected to a switch in a star topology. what type of network is this?
    12·1 answer
  • Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a
    8·1 answer
  • Internally, computers are constructed from circuitry that consists of small on/off switches. What is the most basic circuitry-le
    12·1 answer
  • Lonic compounds are also known as <br> a. salts <br> b. valence <br> c.organic <br> d.elements
    10·2 answers
  • When changing the formatting of a spreadsheet to make it more readable, you should use light blue text on a bright blue backgrou
    12·1 answer
  • What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a
    10·2 answers
  • Which of the following could be a constructor for the public class MyClass? a. public MyClass() b. public void MyClass() c. publ
    7·1 answer
  • What number will be output by the console.log command on line 5?
    9·1 answer
  • How do I get the pictures from my old Samsung phone to put on my iPhone? The Samsung is turned off. Is there a way to transfer i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!