1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
3 years ago
9

Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro

duced by A when “$” is sent. Also mention the OSI layer that is responsible for this.
Computers and Technology
1 answer:
ICE Princess25 [194]3 years ago
4 0

Answer:

Physical / Data link layer

Explanation:

If two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the data would be transmitted if the network is clear but if the network is not clear, the transmission would wait until the network is clear.

The Open Systems Interconnection model (OSI model) has seven layers each with its own function.

The physical layer is the first layer responsible for data transmission over a physical link. The data packets are converted to signals over a transmission media like ethernet cable.

The data link layer is the second layer in the OSI layer responsible for transmission of data packets between nodes in a network. It also provides a way of detecting errors and correcting this errors produced as a result of data transmission.

You might be interested in
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
What will happen if you type pseudocode in another language's programming environment and try to run the
wariber [46]

Answer:

You will get compile error

Explanation:

7 0
3 years ago
Usted repetir la pregunta?<br>O A. Es<br>B. Puede<br>C. Puedes<br>O D. Está​
puteri [66]

Answer:

I believe the answer is B. Puede

5 0
3 years ago
Read 2 more answers
You have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you
love history [14]

Answer:

Make every attempt to recover the data

Explanation:

If your decide to format the drive, use system restore or reinstall the windows OS you may end up loosing all your data so the best option is to try as much as you can attempting to recover the data because the data might or definitely will be lost while using other options you think are available.

8 0
3 years ago
Refer to the exhibit. Switch SW2 was tested in a lab environment and later inserted into the production network. Before the trun
svet-max [94.6K]

Answer:

Switch SW2 seems to have a greater VTP revision number that creates the VLAN data to be deleted in the VTP domain.

Explanation:

Switch SW2 became examined and eventually placed into another production network. Prior to connecting the trunk connection among both SW1 and SW2, the service provider admin enacted the exhibit vtp status instruction as shown in the monitor. Both clients missed access to the network shortly when the switches got linked.

So, the possible reason for the issue is to Switch SW2 tends to have a larger VTP modification percentage allowing that VLAN data to be removed from the VTP domain.

8 0
3 years ago
Other questions:
  • Which online text source would include a review of a new TV show?
    9·2 answers
  • To execute a prepared SQL statement, you can use the _______ and execute methods of the PDOStatement object to set parameter val
    9·1 answer
  • network consisting of computers and other devices that are eithrr fully or partially connected to each other
    7·1 answer
  • All ofthe following are correct EXCEPT one option when it comes towriting disappointing news letters. Identify theexception.
    6·1 answer
  • The World Wide Web (WWW) is a network of links on the Internet to documents containing text, graphics, video, and sound, but doe
    10·1 answer
  • If I wanted to repeat an action such as a heading for a paper, it would be helpful to _____. create a citation create a caption
    9·2 answers
  • Write a program that will predict the size of a population of organisms. The program should ask the user for the starting number
    8·1 answer
  • Write a function called no_you_pick. no_you_pick should have two parameters. The first parameter is a dictionary where the keys
    5·1 answer
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
    12·1 answer
  • The Windows Net use command is a quick way to discover any shared resources on a computer or server. True or False
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!