1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
3 years ago
5

Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model

, identify the highest layer accessed by each of the following devices:(A) Router(B) Unmanaged switch(C) Wireless access point(D) Firewall
Computers and Technology
1 answer:
strojnjashka [21]3 years ago
6 0

Answer:

Router: layer 2

Unmanaged switch: layer 1

Wireless access point: layer 1

Firewall: layer 2

Explanation:

The TCP/IP networking model has four layers, namely,

- Application layer,

- Transport layer,

- Internet layer and

- Network access layer.

The network access layer is the equivalence of the physical and data-link layer in the OSI model. The unmanaged switch transmits frame in the collision domain and the wireless access point allows a collision free frame transfer between nodes. The frame and means of transmission are related to the network access layer of the TCP/IP model.

The Internet layer is an equivalence of the network layer in the OSI model, this is where the ip address is used to communicate within and to remote networks. The router is used to determine a path for packets to destination workstations. The firewall is used to stop unwanted packets from accessing a network. Packets are related to internet layer, so the router and firewall are operational in layer 2, internet layer.

You might be interested in
Select the best answer from the drop-down menu. ________ networks use cables connected directly to the computer. Signals sent in
LekaFEV [45]

Answer: Wired, Wi-fi, Wi-fi, A wired network, Wi-fi

Explanation:

4 0
3 years ago
Write a SELECT statement that returns these columns from the Products table: The list_price column The discount_percent column A
MA_775_DIABLO [31]

Answer:

SELECT  

   list_price,

   discount_percent,

   ROUND(list_price * discount_percent / 100,2) AS discount_amount

FROM

   Products;

Explanation:

6 0
3 years ago
Quick Style sets are located under the Styles group in the Home tab.<br><br> true or false
Ostrovityanka [42]
True, hope this helps
5 0
3 years ago
A touch point that customers encounter in stores or information kiosks, and that uses software to enable them to easily provide
polet [3.4K]

Answer:

point of sale interaction

Explanation:

Point of sale interaction software allow customers buy goods and services with their credit cards, mobile applications etc.

These interaction points are <em>user-friendly</em>, <em>easy-use</em> and <em>highly secure</em>.

Trough point of sale interactions, necessary transactions (like purchase, identity validation) can easily be made without users feeling violated.

8 0
3 years ago
What would be the address of the cell, which is at the intersection of the second row and the third column in a worksheet?
vlada-n [284]

There's another question I found like this which 2 people answered with either C2 or B3. (B3 was rated with 5 stars but I don't know if that was the user them-self)

8 0
3 years ago
Read 2 more answers
Other questions:
  • You can tell when an image is selected, because its sizing handles will be visible. True or False
    15·2 answers
  • Write an expression that evaluates to true if and only if the value of the integer variable workedOvertime is true.
    7·1 answer
  • Most presentations use text: A. To maximize area and style. B. At a minimum. C. To draw attention to content. D. Without restrai
    9·2 answers
  • Can you please answer these questions for me: Is it illegal to copyright? What does it mean to get copyrighted? What are example
    12·2 answers
  • Consider the following code which deletes all the nodes in a linked list. void doublyLinkedList::destroy() { nodeType *temp; //p
    14·1 answer
  • A disciplined, creative, and effective approach to problem solving is needed for project success. The nine-step approach to prob
    13·1 answer
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • ____________________________ and _________________________ are 2 positive impacts of the internet on businesses.
    14·2 answers
  • What is closeable interface in java.
    12·1 answer
  • 15. Question
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!