1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veseljchak [2.6K]
4 years ago
7

"Packet switches have multiple links attached to them. For each attached link the packet switch has a/an ____________, which sto

res packets that the router is about to send into that link."
link buffer

access buffer

output buffer

transmission buffer

none of the above
Computers and Technology
1 answer:
skelet666 [1.2K]4 years ago
5 0

Answer: Output buffer

Explanation:

Each packet switches contain multiple links which are attached to it and for individually attached link the output buffer basically store packets. Then, the router send these packets into multiple links.

In output buffer, if the packets are transmitted into the links but it finds that the link is busy with the another packet for transmission. Then, that particular packet needs to be wait in output buffer.

Therefore, the output buffer is the correct option.

You might be interested in
In this lesson you wrote code to make the turtle draw squares. Briefly describe how the code for
ale4655 [162]

Explanation:

that programming language you must use?

3 0
3 years ago
When two or more people come together to communicate, each person brings their own ___________________.
dimulka [17.4K]

When two people come together,  each with a clear definition of their  identities, the potential can be astounding.  A successful communication is composed of two  individuals - each with a clearly defined sense  of her or his own identity.  

6 0
3 years ago
In Revit, BIM provides a variety of model information. Which piece of information is not offered by BIM? Select Answer A) Payrol
gizmo_the_mogwai [7]

Answer:

yeet my points into my wallet i need brainliest for points plzz

i actually think scheduling im 11 so i dont know dude

4 0
4 years ago
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
Paraphin [41]

Answer:

The question is incomplete.The full question with options is rewritten below:

"While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss.  

Which of the following is the next step the technician should take in troubleshooting this issue?  

A. Contact the ISP, inform the provider of the issue, and ask the provider to check the server.

B. Verify the server has a valid assigned IP address on the LAN subnet.

C. Escalate the problem to a server administrator to check for issues with the server.

D. Check the workstations on the LAN for APIPA configuration."

The answer is option (C): <em>Escalate the problem to a server administrator to check for issues with the server</em>

Explanation:

Being a Support Technician, you may not be able to determine the main issue with the mail server but may need to escalate further to the next category of individual that will confirm the issue with the mail server, in this case the server administrator as he may have higher access into the server at the back end or may directly liaise with the Private ISP.

7 0
3 years ago
What is the treaty of paris
vova2212 [387]

The Treaty of Paris, signed in Paris by representatives of King George III of Great Britain and representatives of the United States of America on September 3, 1783, ended the American Revolutionary War. Hope this helps :)

5 0
3 years ago
Read 2 more answers
Other questions:
  • Smartart and shapes are useful tools because they allow you to
    10·1 answer
  • The __________ assumption necessary for a linear programming model to be appropriate means that the contribution to the objectiv
    6·1 answer
  • An attacker tried to hack into the database of a reputed organization. The attacker inserted malicious code into the query of a
    14·1 answer
  • Input is information a system uses to monitor and adjust itself to meet the goal.
    8·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • Write a program that:
    13·1 answer
  • 1st answer will get brainliest!
    13·2 answers
  • Think about the ways new communication technologies can make certain tasks easier for
    13·1 answer
  • Write a list comprehension statement to generate a list of all pairs of odd posi
    7·1 answer
  • The computer scientists Richard Conway and David Gries once wrote: The absence of error messages during translation of a compute
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!