1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
6

What is most important for you to choose before you build a network?

Computers and Technology
1 answer:
lbvjy [14]3 years ago
3 0

i'm needing help with the same question but mine gave choices, could you help please? thanks

A.  

private network

B.  

NOS

C.  

network media

D.  

network protocol

E.  

directory service

You might be interested in
Protocols used in each layers in each osi reference model
natka813 [3]

The protocols  that are often used in each layers in each OSI reference model are:

Layers                           Protocols

Layer 7- Application          SMTP, HTTP, FTP, POP3, SNMP

Layer 6- Presentation           MPEG, ASCH, SSL, TLS

Layer 5-Session                   NetBIOS, SAP

Layer 4-Transport                      TCP, UDP

Layer 3-Network                IPV5, IPV6, ICMP, IPSEC, ARP, MPLS.

Layer 2-Data Link       RAPA, PPP, Frame Relay, ATM, Fiber Cable.

Layer 1-Physical              RS232, 100BaseTX, ISDN, 11.

<h3>What is OSI Model?</h3>

The OSI Model is known to be a kind of a logical and conceptual framework that tells all about network communication that is often used by systems in an open to interconnection and also in any communication with other forms of systems.

Note that the Open System Interconnection (OSI Model) is one that tells more about a logical network and it is one that also tells about computer packet transfer via the use of various layers of protocols.

Therefore, The protocols  that are often used in each layers in each OSI reference model are:

Layers                           Protocols

Layer 7- Application          SMTP, HTTP, FTP, POP3, SNMP

Layer 6- Presentation            MPEG, ASCH, SSL, TLS

Layer 5-Session                   NetBIOS, SAP

Layer 4-Transport                      TCP, UDP

Layer 3-Network                IPV5, IPV6, ICMP, IPSEC, ARP, MPLS.

Layer 2-Data Link       RAPA, PPP, Frame Relay, ATM, Fiber Cable.

Layer 1-Physical              RS232, 100BaseTX, ISDN, 11.

Learn more about OSI reference model  from

brainly.com/question/12976859

#SPJ1

8 0
2 years ago
is a programming model that focuses on an application's components and data and methods the components use. Group of answer choi
ZanzabumX [31]

Object-oriented programming is a programming model that focuses on an application's components and data and methods the components use.

<h3>What is Object-oriented programming (OOP)?</h3>

This is known to be a form of  a programming paradigm that is known to be due to the idea of "objects", that often contain data and code.

Note that, Object-oriented programming is a programming model that focuses on an application's components and data and methods the components use.

Learn more about programming model from

brainly.com/question/22654163

#SPJ1

7 0
2 years ago
Which statement will add a string to the string pool?
Alecsey [184]

Answer:

string newstring="hello"

7 0
2 years ago
What are the four levels of access rights?
Svet_ta [14]

Explanation:

Currently, there are four primary types of access control models: mandatory access control (MAC), role-based access control (RBAC), discretionary access control (DAC), and rule-based access control (RBAC). Each model

5 0
3 years ago
Another name for the Office Button menu is the toolbar. Please select the best answer from the choices provided T F
Troyanec [42]

False is the answer for this question i just did a test on E2020 and it was false because it gave me the answer the other person is wrong just to let you know


6 0
3 years ago
Read 2 more answers
Other questions:
  • If num is an int which expression always evaluates to true if num holds an odd number
    14·1 answer
  • Which of the following instruments are used when performing a high-rate discharge test on a storage battery
    7·1 answer
  • Hello users !
    10·2 answers
  • "the master boot record (mbr) method of partitioning hard drives is limited to what maximum size of drives
    13·1 answer
  • One blog may have a greater social influence than another when it has_______?
    12·2 answers
  • What describes a group of cells?<br> O crowd<br> Orange<br> O set<br> gangle
    7·2 answers
  • Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
    8·1 answer
  • Interviews should never feel like an_________Instead, they should feel like a________
    9·1 answer
  • Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a tr
    8·1 answer
  • charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!