1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
3 years ago
8

Which of the following defines guidelines that specify the way computers access the medium to which they are attached, the type(

s) of medium used, the speeds used on different types of networks, and the type(s) of physical cable and/or the wireless technology used?
(A) Network metric
(B) Network matrix
(C) Network index
(D) Network standard
Computers and Technology
1 answer:
Tatiana [17]3 years ago
5 0

Answer:

(D) Network Standard.

Explanation:

Networking standards ensures the ability of networking technologies by defining the guidelines of communication that specify way computer access the medium they are attached.Network standards also defines which type of transmission transmission to use wireless or wired,which media to use etc.

You might be interested in
An interactive online representation of geospatial data, which can be accesses via a Web browser is a(an): a. Web Application b.
Mashcka [7]

Answer: Web Map

Explanation:

7 0
2 years ago
You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
leva [86]

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

5 0
3 years ago
What is the simplest way to permanently get rid of an unwanted file? A. Cancel the file. B. Go to the Start menu and then delete
Morgarella [4.7K]
Go to the Start menu and then delete the file <span>is the simplest way to permanently get rid of an unwanted file</span>
5 0
4 years ago
Implement a simplified version of a crypto broker platform. Initially, there is an array of users, with each user depositing onl
Salsk061 [2.6K]
Jriririiekeekekkksks
3 0
3 years ago
5. Which of the code excerpts below correctly links to an element with the id "awesome”.
Pachacha [2.7K]

Answer:

I think its click me

Explanation:

click me

6 0
3 years ago
Read 2 more answers
Other questions:
  • Write down the complete AJAX code to avoid page caching.
    6·1 answer
  • A _____ is a control that tells the computer what task to perform.
    6·1 answer
  • _________________________ was designed to provide devices with a method for notifying each other that a link is experiencing con
    15·1 answer
  • Hi there. I need to know that if I take computer fundamentals, will that class teach anything about graphic design or digital de
    9·1 answer
  • What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co
    11·1 answer
  • a machine needs a minimum of 100 sec to sort 1000 names by quicksort what is the approximate worst case time needed to sort 100
    13·1 answer
  • Hardware is found outside the system unit.​
    13·1 answer
  • True or False? Threat modeling is the practice of identifying and prioritizing potential threats and security mitigations to pro
    9·1 answer
  • Backing up your data on a regular basis is a part of the
    14·2 answers
  • Vẽ sơ đồ lắp đặt gồm 2 cầu chì, 1 ổ điện, 2 cực điều khiển 2 đèn mắc song song
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!