1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
3 years ago
5

Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model

, identify the highest layer accessed by each of the following devices:(A) Router(B) Unmanaged switch(C) Wireless access point(D) Firewall
Computers and Technology
1 answer:
strojnjashka [21]3 years ago
6 0

Answer:

Router: layer 2

Unmanaged switch: layer 1

Wireless access point: layer 1

Firewall: layer 2

Explanation:

The TCP/IP networking model has four layers, namely,

- Application layer,

- Transport layer,

- Internet layer and

- Network access layer.

The network access layer is the equivalence of the physical and data-link layer in the OSI model. The unmanaged switch transmits frame in the collision domain and the wireless access point allows a collision free frame transfer between nodes. The frame and means of transmission are related to the network access layer of the TCP/IP model.

The Internet layer is an equivalence of the network layer in the OSI model, this is where the ip address is used to communicate within and to remote networks. The router is used to determine a path for packets to destination workstations. The firewall is used to stop unwanted packets from accessing a network. Packets are related to internet layer, so the router and firewall are operational in layer 2, internet layer.

You might be interested in
A file extension of .xlsx means that the file contains what?
laiz [17]

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

3 0
3 years ago
Public class SomeClass { private String aName; private int aNumber; private boolean amAwesome; public SomeClass(String name, int
scoray [572]

Answer:

The objects created in the main method and their initial states are given below

Explanation:

The objects and initial state of each object( the values of each object’s variables) are thus:

We have objects awesome, amazing and fantastic.

initial state of awesome object is

aName = "Awesome"; aNumber = 5; amAwesome = true;

initial state of amazing object is

aName = "Amazing"; aNumber = -10; amAwesome = false;

initial state of fantastic object is

aName = "Fantastic"; aNumber = 11; amAwesome = true

3 0
3 years ago
If classes C1 and C2 both implement an interface Cint, which has a method whichIsIt, and if C1 c = new C1( ); is performed at on
Assoli18 [71]

Answer:

FALSE

Explanation:

Because C1 and C2 implement the same interface, they both implement whichIsIt. The variable c is known as a polymorphic variable, meaning that it can change from being an C1 to a C2. So, the message c.whichIsIt( ); may invoke C1's whichIsIt or C2's whichIsIt. This can only be known at runtime.

5 0
3 years ago
Which disclosure paradigm has as its assumptions that 1) an attacker will learn little or nothing from disclosure; 2) Disclosure
nekit [7.7K]

The  disclosure paradigm has as its assumptions that an attacker will learn little or nothing from disclosure is known as Open source.

<h3>What is open source?</h3>

An  Open source is known to be a term that connote that is said to be an Open source software set up to be publicly used by people.

Therefore, The  disclosure paradigm has as its assumptions that an attacker will learn little or nothing from disclosure is known as Open source.

Learn more about Open source from

brainly.com/question/6065176

#SPJ1

3 0
2 years ago
Event-driven GUI programs sometimes require fewer coded loops than their counterpart console applications because some events ar
Westkost [7]

Answer:

User-action

Explanation:

In some cases, an event can be as a result of a user action, such as when the user clicks the mouse button, types a character, or clicks a button.

The program might respond to a mouse-click on a canvas by drawing a shape, to a typed character by adding the character to an input box, or to a click on a button by clearing a drawing.

5 0
3 years ago
Other questions:
  • Write a program that allows the user to convert a temperature given in degrees from either Celsius to Fahrenheit or Fahrenheit t
    13·1 answer
  • When there are items that are out of the control of the programmer that may support or oppose the program goals, this is termed
    15·1 answer
  • What does the machine do and how do the operators react to their work?
    13·1 answer
  • Match each type of software license with the appropriate definition.
    11·1 answer
  • What is the most common password on the internet?
    11·2 answers
  • Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
    11·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    8·1 answer
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • B. What significant values have you learned while learning the tools and utensils?
    8·1 answer
  • When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!