1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
4 years ago
6

What is a Layer 2 device that receives an electrical signal in one port, interprets the bits, and makes a filtering or forwardin

g decision about the frame? If it forwards, it sends a regenerated signal. This network device typically has many physical ports, oftentimes with RJ-45 connectors.
Hub
Firewall
Switch
Router
Computers and Technology
1 answer:
iren2701 [21]4 years ago
5 0

Answer:

Router

Explanation:

Router -

It is a networking device which helps to forward the data packets between the networks of the computer .

It acts as a traffic director in the internet .

The data which is sent via internet is made into data packets . And then the packet is forwarded from one router to another , until the packed reaches its destination .

The function given in the question is about router .

You might be interested in
What is computer hardware?list any 4 computer hardware​
Scilla [17]

Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of

8 0
3 years ago
Read 2 more answers
What is computer virus​
IRINA_888 [86]

Answer:

A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

8 0
3 years ago
Read 2 more answers
Select the correct answer.
IrinaK [193]
The answer is the letter (D)
4 0
3 years ago
Consider the following declaration: (1, 2) double currentBalance[91]; In this declaration, identify the following: a. The array
Rom4ik [11]

Answer:

Following are the solution to the given choices:

Explanation:

Given:

double currentBalance[91];//defining a double array  

In point a:  

The name of the array is= currentBalance.  

In point b:  

91 double values could be saved in the array. It requires 8bytes to hold a double that if the array size is 91*8 = 728

In point c:  

Each element's data type is double.

In point d:  

The array index range of values is between 0 and 90 (every array index starts from 0 and ends in N-1, here N=91).  

In point e:  

To access first element use currentBalance[0], for middle currentBalance[91/2] , for last currentBalance[90]

3 0
3 years ago
Write the definition of a function typing_speed, that receives two parameters. The first is the number of words that a person ha
m_a_m_a [10]

Answer:

The function code and the formula for the above question is listed below:

Explanation:

Function:

float typing_speed(int Number_of_words, int Time_in_seconds)

{

float time= Time_in_seconds/60;

float speed= Number_of_words/time;

return speed;

}

Formula for this algorithm or program:

Number of words per minute= number of words/ Time(in minutes).

Function Explanation

  • The above function defined in the c-language code, which is used to return the typing speed for any user when he enters the number of words and the time in seconds.
  • The speed is calculated with the help of the above-defined formula.
  • The first statement of the code is used to change the time in a minute.
  • The second statement of the code is used to calculate the speed by the help of speed formula.
  • Then the third statement returns the value of the speed variable.

6 0
3 years ago
Other questions:
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • Which of the following courses would an aspiring film composer most likely take?
    12·2 answers
  • The TCP/IP ____ layer, sometimes called the Internet layer, is roughly equivalent to OSI's network layer.
    7·1 answer
  • Use the Law of Sines to solve the triangle. Round your answers to two decimal places.
    6·1 answer
  • What is the foundational domain for business
    12·1 answer
  • The span was so long, the height so great, and the enterprise likely to be so costly, that few thought of it as something begun
    9·2 answers
  • Which are the two alternatives for pasting copied data in a target cell or a group of cells?
    12·1 answer
  • An enhancement to a computer accelerates some mode of execution by a factor of 10. The enhanced mode is used 50% of the time, me
    11·1 answer
  • Martin is responsible for translating the script into a visual form by creating a storyboard. Which role is he playing?
    8·1 answer
  • Fish Aquarium System of functional and Non-Functional requirement of the system.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!