Answer:
implements CSMA/CD over legacy shared half-duplex media; enables IPv4 and IPv6 to utilize the same physical medium; integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper
Explanation:
I hope it helped . follow me on ig minisized._miyaa
Answer:
The digits: 0 and 1, are used by binary code to represent computer text or instructions and a bit string is assigned to each symbol or instruction. Computers use binary numbers because they have circuits that are either on or off, which gives them two states to work from to make calculations and run processes.
Hope this helped you!
Explanation:
Answer:
components are connected end-to-end in a line to form a single path for electron s to flow
Explanation:
If you put morw lamps into serious circuit, the lamps will be dimmer than they were before.
Answer:
import java.util.Scanner;
public class salary{
public static void main(String []args){
System.out.println("Enter the monthly pay: ");
Scanner scn = new Scanner(System.in);
double salary = scn.nextDouble();
double result = salary-(salary*0.15*0.035*0.0575*0.0275*0.05)-75;
System.out.println("The net salary is: "+result);
}
}
Explanation:
first import the Scanner class for taking the input from user.
then, create the main function and print the message for enter the salary from user. scn.nextDouble() store the value enter by user into the result.
after that, calculate the net salary by calculating the deduction amount and then subtract with salary.
finally, print the result on the screen.
Answer:(C) Anyone with access to the personal computers could log on to the mainframe.
Explanation:
It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.
Here we have to identify the associated risk with this approach.
This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.
option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.
option (B) is incorrect because it has nothing to do anything with training of the personnel.
option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.