Answer:
Physical and data link layer.
Explanation:
The ethernet cable is used at the physical layer. The physical layer consists of hardware components. This layer is responsible for transmission of data bits between two nodes via a physical wire. The data link layer provides the means in which data packets are transmitted from one node to another.
Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the packets would be sent from computer A to computer B if computer B is free if not it would wait until computer B is not transmitting before it can start sending data packets to computer B.
Answer:
A-because most of the victims of intellectual theft are individuals
Explanation:
Its definitely the first, and not B., C, or D,
Countries are no barrier in catching the theft, as almost all the countries now have issued the online identification number of each of their citizens. However, some of them are in the process. Hence, for next one - two years we can add add the B as well:
B-because much intellectual theft is committed in other countries
However, as this work is complete, the B option will not be an issue related to intellectual theft analysis and control.
And C and D are definitely not the part of the answer, as associations like FCC USA, Internet association etc are technically sound enough, and quite good to fight a case under any law as well.
Answer:
C. consistency, aesthetics
Explanation:
Based on the descriptions given to us in the question we can deduce that the answer is C. consistency, aesthetics. This is because "consistency" is defined as something that always delivers the same results, which is what users need from the interface in order to understand it and continue using it. While "aesthetics" is defined as the visual representation of something (how something will look).
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
Answer:
send a threatening text in reply, then block the phone number block the phone number, then contact his phone service provider immediately delete the text, then report the incident to authorities ignore the message, then get a new cell phone number.
Explanation: