1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
9

What is a characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications amon

g many hosts?
Computers and Technology
1 answer:
Paladinen [302]3 years ago
6 0

Answer:

The correct answer to the following question will be "The capacity to work without reference to the data that would be contained in each bundle".

Explanation:

  • The Layer network governs the activity of the subnet. The main objective of this layer would be to transport data over multiple links from source to destination. When two computers are linked to the same cable, see no need for the network layer.
  • The role of this layer protocols defines the configuration and handling of packets used to transfer information from one to another host.
  • The main purpose of this layer is to allow multiple channels to be intertwined. This is achieved by sending packets to network adapters that depend on algorithms to identify the best directions for the information to move. Such routes are referred to as computer circuits.

Therefore, it would be the right answer.

You might be interested in
You're setting up offline conversion tracking. You need to to upload offline data into your Google Ads account. Which two format
ikadub [295]

Answer:

The two formats supported are C. Google sheets and D. CSV

Explanation:

Google Sheets, CSV (Comma Separated Value) files and Excel files are accepted for upload in the google ads account. To upload files,

  1. go to conversions and click on uploads (should be found on the left sidebar).
  2. Look for the + (plus) sign to begin your upload.
  3. Locate the location of the documents either on your local computer or sync with google sheets.
  4. Once the upload is complete, click the preview button to check the uploaded data to see it if it correct.
  5. As soon as you are satisfied, click on Apply to sync your data to your google ads account.
8 0
3 years ago
Justify the first two paragraphs and the tips list.
Ket [755]

Answer:

dont mind me just hwere is your question i literaly can see it anywhere

Explanation:

4 0
3 years ago
A mechanic uses a screw driver to install a ¼-20 UNC bolt into a mechanical brace. What is the mechanical advantage of the syste
velikii [3]

Answer:

15.7 ; 78.5

Explanation:

Mechanical advantage of a screw = Circumference / pitch

Circumference = pi × d

Where :

pi = 3.142, D = diameter

Therefore ;

Circumference = 3.142 × (1/4) = 0.785 in

Pitch = 1/TPI

TPI (thread per inch) = 20

Pitch = 1/ 20 = 0.05

Mechanical advantage = 0.785 / 0.05 = 15.7

Resistance force if effort force is 5lb

Mechanical advantage = Fr / Fe

Fe = effort force, Fr = resistance force

15.7 = Fr / 5

Fr = 15.7 × 5 = 78.5 lbs

7 0
3 years ago
A program requires a variable to store an integer value of 3000000000. Which of the following statements can be used?
Anastasy [175]

22222222Explanation:

8 0
3 years ago
In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the enti
irakobra [83]
<span>In a RING TOPOLOGY, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network.

A ring topology is composed of nodes connected to </span><span>exactly two other nodes that forms into a single continuous pathway for signals through each node. This formation results to a disruption of the entire network when any link between nodes is severed. </span>
4 0
3 years ago
Other questions:
  • It takes an older computer twice as long to send out a company's email as it does a newer computer. Working together, it takes t
    15·1 answer
  • In Paint, which of the following are ways to use a picture that you have saved on your computer? (Select all that apply.)
    8·1 answer
  • Brute force attacks involve identifying a valid user account and then bombarding the server with an extensive:
    13·1 answer
  • In which career field would the computing technology industry associations compTIA A+ certification be useful
    6·1 answer
  • Which line in the following program contains the header for the showDub function? 1 #include«iostream» 2 using namespace std; 4
    15·1 answer
  • “Urban Populations” should fall under which sections of your organizer?
    13·2 answers
  • What Hulu shows should I watch? Actually answer tho.
    7·2 answers
  • Mainframe computers are multi-programming, high-performance computers, and multi-user, which means it can handle the workload of
    7·2 answers
  • True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
    15·1 answer
  • Petra notices that there are a number of issues with a new fiber optic connection whose status appears to be going up and down c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!