1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aksik [14]
3 years ago
8

What is the difference between a switch and a hub?

Computers and Technology
1 answer:
marta [7]3 years ago
8 0

Explanation:

A hub is used to send the message from one port to other ports.It does not know the specific address of the destination where the message needs to send.it works on Physical layer of the OSI model(layer 1).

A switch can handle data and it knows the specific address of the destination.A switch works on the data link Layer of the OSI model(layer 2).

You might be interested in
Evidence that Social media hasn’t improved human communication.
LUCKY_DIMON [66]

Answer:

language and interpersonal communication, basically it would make someone antisocial.

5 0
3 years ago
What is data security
NARA [144]
Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, tokenization, and key management practices that protect data across all applications and platforms.
5 0
3 years ago
Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and cond
mezya [45]

Answer:

d. integrity

Explanation:

Data integrity is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.

Data integrity can be used to describe a state, a process or a function – and is often used as a proxy for “data quality”. Data with “integrity” is said to have a complete or whole structure. Data integrity is imposed within a database when it is designed and is authenticated through the ongoing use of error checking and validation routines. As a simple example, to maintain data integrity numeric columns/cells should not accept alphabetic data.

4 0
4 years ago
Whats important about the points?
likoan [24]
You can earn ranks! That is important.
8 0
3 years ago
Read 2 more answers
Your boss wants you to configure his laptop so that he can access the company network when he is on the road. You suggest a VPN
Rashid [163]

Answer:

All traffic that flows between the laptop and VPN server is encrypted.

Explanation:

A Virtual Private Network (VPN) is a "tunnel" connection between computers that performs just like a regular point-to-point network connection (that is, IP address to IP address).  It has the added feature that encryption is enabled so that no intermediate server (or computer or line monitor, etc.) can decode the information that is in the data portion of the packets.

5 0
3 years ago
Other questions:
  • A. True
    14·2 answers
  • What block cipher mode of operation involves each ciphertext block being fed back into the encryption process to encrypt the nex
    12·1 answer
  • Advancement in technology is making peripherals...
    5·2 answers
  • Which statement is used to create a file object that will append data to an existing file? BufferedWriter salesdata =
    7·2 answers
  • Once artwork is inserted into a placeholder, it can be moved around on a slide. True False
    9·1 answer
  • Jim is expecting a very busy weekend at his store, so he sent the following e-mail to his employees: ALL EMPLOYEES MUST WORK THI
    6·1 answer
  • Firefox, Chrome, Opera, and Safari are examples of
    15·1 answer
  • When are bar charts most commonly used
    10·1 answer
  • When an object is acted on by unbalanced forces, the object will always
    11·1 answer
  • Explain what led to the invention of lasers
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!