1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
12

What is true concerning physical and logical topologies? Physical topologies are concerned with how a network transfers frames.

Logical topologies refer to how a network transfers data between devices. The logical topology is always the same as the physical topology. Physical topologies display the IP addressing scheme of each network.
Computers and Technology
1 answer:
Sindrei [870]3 years ago
8 0

Answer:

Physical means the actual wires.  Physical is concerned with how the wires are connected. Logical is concerned with how they transmit.

Explanation:

You might be interested in
Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r
shusha [124]

Answer:

Hashing can be termed as the alteration of a string of characters into a frequently smaller fixed-length value or key that represents the original string.

Explanation:

Hashing are utilized to catalog and recover digital items in a database since it is quicker to find the item using the shorter hashed key than finding the items using the original value.

5 0
4 years ago
Select the correct answer.
lesantik [10]

Answer:

UI designer

Explanation:

3 0
3 years ago
How to make an absolute value line on keyboard?
butalik [34]
Google it.
////////////////
5 0
3 years ago
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow the
Anika [276]

Answer:

Possessed objects

Explanation:

Objects that are carried around by users to identify themselves with and to allow them access into computer systems are called possessed objects. Examples of such objects are;

i. smart cards

ii. driver's license

iii. id cards

iv. smart keys

v. smart watches.

Possessed objects are not the only way to allow authentication. Other methods are through memorized information (such as passwords, PINs) and through biometric devices (such as face recognition and voice recognition devices).

5 0
3 years ago
As a rule, e-mail creates a more permanent record than other forms of business communication.
salantis [7]

Answer:

False

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Pls help me. ask yourself what would jesus do...
    14·1 answer
  • Which of the following best describes Vivofit’s purpose?
    9·1 answer
  • Is Front lighting is always the best light direction for a portrait?
    5·1 answer
  • Create a loop that will output all the multiples of 5 that are greater than zero and less than 60 (do not include 60). 5, 10, 15
    10·1 answer
  • A student has created a Book class. The class contains variables to represent the following.An int variable called pages to repr
    11·1 answer
  • At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
    7·1 answer
  • C++ coding, help
    6·1 answer
  • 5. Developed by Paul Hawkins, it is a computer system
    14·1 answer
  • What symbol does access use to the left of a record when it is currently being edited and is therefore locked so that other user
    12·1 answer
  • Matteo is the human resources manager at a major printing firm. He wants to use
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!