1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BabaBlast [244]
3 years ago
14

Which device is similar to a hub but can isolate groups of devices on a network?

Computers and Technology
1 answer:
alexdok [17]3 years ago
5 0

Answer:

Router

Explanation:

A hub is so similar like a switch, but a switch is smarter than the hub because can be to know what port is connected, but is this particular question we have a router like options, this is the smartest of the three options because we can segregate and isolate groups of the device on a network, this is the most complex to use of the three option because we have to make some settings like the DHCP.

You might be interested in
a user's given name followed by the user's age from standard input. Then use an ofstream object named outdata (which you must de
RUDIKE [14]

Answer:

See explaination for program code

Explanation:

#include <iostream>

#include <string>

#include <fstream>

using namespace std;

int main() {

string name;

int age;

cout << "Enter name of user: ";

getline(cin, name);

cout << "Enter age of user: ";

cin >> age;

ofstream outdata("outdata");

outdata << name << " " << age << endl;

outdata.close();

return 0;

}

4 0
3 years ago
Frrrrrrrrrrreeeeeeeeee brainliest for u
sukhopar [10]

Answer:

Yay I want brainliest

Explanation:

5 0
3 years ago
Read 2 more answers
Computer program allowing the computer to communicate<br> with a hardware device
Airida [17]

Answer:The software that allows a computer to communicate with hardware devices is referred to by the general term known as 'Drivers.

Explanation:Transmission Control Protocol/Internet Protocol (TCP/IP) is the backbone of the Internet and the true language computers use to talk to each other. Essentially it's a set of standards for sending information from a computer's network card, through transmission lines to another network card.

8 0
3 years ago
Which key prevents movement between cells in a spreadsheet?
Natasha_Volkova [10]

The Scroll Lock key - Most of the time on the keyboard it is abbreviated ScrLK, or Scroll Lock.

8 0
3 years ago
The ____ job functions and organizational roles focus on protecting the organization's information systems and stored informatio
dalvyx [7]

Answer:

Option B i.e., Information security management and professionals is the correct option.

Explanation:

They performs the work duties and operational responsibilities focus on supporting the information systems of the corporation and information stored against threats. IMS is a set of principles and protocols for the structured handling of sensitive information within an enterprise. An ISMS helps to eliminate risks and maintain continuity of operation through pro-actively minimizing the effects of a breach of security.

5 0
4 years ago
Other questions:
  • A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection w
    9·1 answer
  • The good example of pivoting is changing thedimensions along the axis.? True? False
    9·1 answer
  • Make this the most answered question<br><br><br><br> (for tiktok)
    8·2 answers
  • Which of the following is the best name for a history report about World War I?
    7·2 answers
  • "Why learning how to type is so important.
    7·1 answer
  • Who like the videos where is clown is from :)
    6·1 answer
  • Find true or false. A hacker is hacking software with access in sensitive information from your computer​
    9·1 answer
  • Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
    7·1 answer
  • Which of the following are all involved in the evaluation of the presentation of a speech?
    5·1 answer
  • nder a Huffman encoding ofnsymbols with frequenciesf1, f2, . . . , fn, what is the longest a codewordcould possibly be
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!