1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
11

Which device makes computers that are connected to separate segments appear and behave as if they're on the same segment? (Pleas

e choose from one of the four options below)
Bridge

Hub

Router

Switch
Computers and Technology
1 answer:
Mashcka [7]3 years ago
4 0

Answer: Switch

Explanation:

 The switch is the device that is basically use for the connection for separate segment that basically appear in the similar segment in the computer network.

Switch is the ethernet that is based on the  LAN peruses approaching TCP/IP information packets containing goal data as they go into at least one info ports. The goal data in the bundles is utilized to figure out which yield ports that will be utilized to sending the information on to its proposed goal.

Therefore, Switch is the correct options.

 

You might be interested in
Stages of reverse engineering
ivann1987 [24]

Answer:

Capture Data, Refine the Model, and then Manufacture it.

Explanation:

5 0
3 years ago
A hardware supplier manufactures three kinds of​ clamps, types​ A, B, and C. Production restrictions force it to make 10 more ty
Rufina [12.5K]

Answer:

A = 120

B = 40

C = 70

Solution:

As per the question:

Manufacturer forced to make 10 more type C clamps than the total of A and b:

10 + A + B = C                (1)

Also, 3 times as many type B as type A clamps are:

A = 3B                             (2)

The total no. of clamps produced per day:

A + B + C  = 330              (3)

The no. of each type manufactured per day:

Now, from eqn (1), and (3):

A + B + 10 + A + B = 330

2A + 2B = 320

A + B = 160                       (4)

Now, from eqn (2) and (4):

3B + B = 160

B = 40

Since, A = 3B

A = 3\times 40

A = 120          

Put the values of A and C in eqn (3):

120 + 40 + C = 330

C = 70

4 0
3 years ago
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
What are the types of Operating System​
Archy [21]

Answer:

1. Gestión de la memoria principal

Esta es una característica del sistema operativo básica. La memoria principal de la computadora almacena los datos que serán usados por el CPU en la ejecución de los programas. El sistema operativo se encarga de gestionarla, es decir, asignar partes de memoria a la nueva información usada, y evitar que se sature.

2. Gestión de la memoria secundaria

Es la memoria más “permanente” de una computadora. Al igual que la memoria principal, el SO sistema operativo asigna el orden de guardado en esta memoria y la mejor manera de aprovechar el espacio libre.  

3. Gestión de procesos

Cuando envías un comando para que el ordenador realice una tarea, una de las funciones del sistema operativo es organizar los recursos de la computadora para ejecutarla. Esto incluye la memoria, el tiempo del CPU, los programas y archivos necesarios para ejecutar la tarea, los procesos que podrían entorpecerla y los periféricos que podrían ser necesarios para cumplirla.

4. Gestión de recursos  

¡Esta es una de las características del sistema operativo más importantes! El sistema operativo coordina los recursos del hardware que integra la computadora para cumplir con las tareas requeridas. El CPU, los periféricos, las memorias principal y secundaria, los programas, todo tiene que trabajar al unísono para cumplir con las tareas de forma óptima.

5. Gestión de usuarios  

El software operativo controla el acceso de los usuarios a las cuentas individuales o grupales. También, se encarga de administrar a qué recursos e información tiene acceso cada uno de ellos.  

6. Gestión de la seguridad  

Así como controla el acceso de usuarios, el sistema operativo también está encargado de gestionar los controles de seguridad de la computadora, entre ellos el firewall. Por ejemplo, en cuanto a la función del sistema operativo para la seguridad informática es evitar la pérdida de datos, controlar la confidencialidad de los datos y controlar el acceso a la información y a los recursos del equipo.

5 0
3 years ago
Which of these agencies main goal is the promotion of consumer protection?Immersive Reader
sattari [20]

Answer:

FTC (Federal Trade Commission)

Explanation:

However, it is not just the one government body that works to ensure consumer protection. The FTC is certainly one, however, though the others are the Food and Drug Administration, Financial Protection Bureau and the US Department of Justice. And all these bodies together ensure that the rights of the consumer are protected, through enforcement of various acts, and each of them deals with a certain type of good.

6 0
3 years ago
Other questions:
  • Rebecca received the following e-mail from her boss: I NEED ALL EMPLOYEES TO WORK LATE ON SATURDAY. NO EXCEPTIONS! What is the m
    13·2 answers
  • What is the lowest and highest address of a 2^20 byte memory, if it is byte readable.
    11·1 answer
  • Describe any five GSM PLMN basic services?
    10·1 answer
  • 01110100 01101000 01101001 01110011 00100000 01110011 01110101 01100011 01101011 01110011 00100000 01100010 01100001 01101100 01
    12·2 answers
  • Write a Java program that has a static method named range that takes an array of integers as a parameter and returns the range o
    10·1 answer
  • What type of formula uses data from multiple worksheets
    6·1 answer
  • 3.1.14 Wormhole CodeHS <br><br> May I have it in a copy and paste, please?
    5·1 answer
  • What's your fav show?
    12·2 answers
  • Where are 'if' and 'else' statements shown when printing a document in a word processor?
    8·1 answer
  • How do you get your winkey wet??
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!