1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
4 years ago
9

Define full-duplex. Group of answer choices term used to describe the networking device that enables hosts in a LAN to connect t

o networks and hosts outside the LAN. It carries the configuration information between each end of a data link. The communication device can transmit and receive but not at the same time. The communications device can transmit and receive at the same time.
Computers and Technology
1 answer:
pishuonlain [190]4 years ago
5 0

Answer:

The communications device can transmit and receive at the same time.

It carries the configuration information between each end of a data link.

Explanation:

Full duplex is a mode of communication between two ports connected by a single link. It allows for transmitting and receiving of data at the same time on a single data-link.

When full duplex is configured on one port and half duplex, on another, it gives an mismatch error and communication is disallowed. So both ports on a single data-link must be configured with the communication mode like full duplex for compatible and fast transmission.

You might be interested in
Which term describes the order of arrangement of files and folders on a computer?
jonny [76]
The term that best describes this would be called computer files and or organization file
6 0
3 years ago
Read 2 more answers
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
If we recorded the average U.S. Housing Price every month for the next year, what graphical display is most appropriate to displ
JulijaS [17]

Answer:

Time plot.

Explanation:

A time plot, also known as a time series can be defined as a graphical representation of a pre-defined value (data) against time.

If we recorded the average U.S. Housing Price every month for the next year, the graphical display which  is most appropriate to display the data is a time plot.

Generally, when representing data that changes with respect to time or that are random in nature; a time plot is considered to be the most effective graphical display to use.

In this scenario, the average U.S. Housing Price that is observed should be plotted against the time of occurrence (months) over a year.

3 0
3 years ago
6. What is saddle-stitch binding?
kifflom [539]
Commonly known as book stapling, ‘saddle stitched’ is one of the most popular binding methods. The technique uses printed sheets which are folded and nestled inside each other. These pages are then stapled together through the fold line. Saddle stitched binding can be applied to all book dimensions and both portrait and landscape orientation.
5 0
3 years ago
Read 2 more answers
A bin contains 100 sty le a notebooks, 100 style b notebooks, and 100 style c notebooks. antoine will select 3 notebooks from th
emmasim [6.3K]
<span>The answer is Ten.  Substituting numbers for letters, available selections are 111, 112, 113, 122, 123, 133, 222, 223, 233, 333.  Note that, for example, 112, 121, and 211 are considered as the same selection.
</span>AAA, BBB, CCC, <span>AAB, AAC, </span><span>BBC, </span><span>ABB, ACC, </span><span>CCB & ABC.</span>
7 0
4 years ago
Other questions:
  • Stan is looking at cloud computing options for his business needs. He wants a model that helps his business customers and client
    12·2 answers
  • Whats the relationship between cpu memory and disk​
    10·1 answer
  • The length of time the valve is open, expressed in degrees of crankshaft rotation, is called camshaft
    10·1 answer
  • The process of using a computer to write, design, and assemble documents is called A. desktop publishing. B. scanning. C. consul
    7·1 answer
  • Difference between query and filter<br><br>​
    12·1 answer
  • :3 Brainlsit included! =) 33 points!
    10·1 answer
  • Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    6·1 answer
  • In a typical e-mail address, the \"host\"is
    5·1 answer
  • Which of the following are used to classify plutons
    14·1 answer
  • Who Invented Abacus!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!