1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
3 years ago
5

Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model

, identify the highest layer accessed by each of the following devices:(A) Router(B) Unmanaged switch(C) Wireless access point(D) Firewall
Computers and Technology
1 answer:
strojnjashka [21]3 years ago
6 0

Answer:

Router: layer 2

Unmanaged switch: layer 1

Wireless access point: layer 1

Firewall: layer 2

Explanation:

The TCP/IP networking model has four layers, namely,

- Application layer,

- Transport layer,

- Internet layer and

- Network access layer.

The network access layer is the equivalence of the physical and data-link layer in the OSI model. The unmanaged switch transmits frame in the collision domain and the wireless access point allows a collision free frame transfer between nodes. The frame and means of transmission are related to the network access layer of the TCP/IP model.

The Internet layer is an equivalence of the network layer in the OSI model, this is where the ip address is used to communicate within and to remote networks. The router is used to determine a path for packets to destination workstations. The firewall is used to stop unwanted packets from accessing a network. Packets are related to internet layer, so the router and firewall are operational in layer 2, internet layer.

You might be interested in
How does the technology work
Ivan

Answer:  it does – or perhaps appears to do – in the world.

Explanation:

sorry if am not right have a nice day lol

6 0
3 years ago
Read 2 more answers
Six causes of data lost
Serhud [2]
Hard drive failures

Accidental deletions

Computer viruses and malware infections



Power failures
6 0
3 years ago
You can view information for the individual people who will perform the tasks on theproject in the
marin [14]

Answer:

Resource Sheet view

8 0
3 years ago
If a firm puts Internet-facing servers directly in the Internet, they are exposed to threats of attack from anywhere in the worl
djverab [1.8K]

Answer:

True.

Explanation:

If a firm puts servers that are internet facing directly on the internet then the servers are exposed to external attacks and these attacks can be from anywhere in the world.

The server becomes vulnerable or unsafe and attackers can attack and can manipulate or tamper the server code from anywhere in the world.

8 0
3 years ago
Which of these are variables in an organization? Choose three.
Rzqust [24]

Answer:

Example of organizational variables are codes of ethics, ethical climate, organizational size, top management, organizational structure and organization culture.

Explanation:

Organizational variables can be defined as characteristics of a decision that influences the decision-making process and its outcome. This organizational variables also influence how an individual makes decisions.

Example of organizational variables are codes of ethics, ethical climate, organizational size, top management, organizational structure and organization culture.

6 0
3 years ago
Other questions:
  • Which numbering system is used for some network addresses, to describe colors
    6·1 answer
  • Sarah is creating and formatting a newsletter for her school. Which page layout rules should she consider when doing this?
    13·2 answers
  • A type of cpu socket, used with modern intel processors, where the cpu itself has no pins but the contact pads of the cpu line u
    8·2 answers
  • A strategy to solve a logic problem is to break it into steps. Using the drop-down menu, complete these sentences about solving
    15·2 answers
  • When including multiple images in a report, it may help to create a _____ on each image so you can cross reference them througho
    11·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    15·1 answer
  • How does voting help in a social news site?
    10·1 answer
  • My friend has 200 subs and i have only 36 can you help me its ACYT ZR
    9·2 answers
  • Describe how a computer checks whether the image just taken by the camera matches the scanned photograph.
    12·1 answer
  • Leon needs to configure the days and times of his work week for his Outlook Calendar. Which option should he
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!