1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
5

The function of network switch is to _____.

Computers and Technology
1 answer:
enyata [817]3 years ago
3 0

Answer:Its C.

Explanation:

You might be interested in
A __________ is a repository of data gathered from operational data and other sources that is designed to serve a particular com
VMariaS [17]
Data Mart is a smaller amount of data that is collected from a data warehouse.
8 0
3 years ago
Consumers may receive an​ e-mail, supposedly from their bank or credit card​ company, saying that their​ account's security has
Gnom [1K]

Answer:

Phishing

Explanation:

Phishing is a term used when a person fraudly or illegally uses a digital communication channel i.e. emails, by using the name of some reputed company or banks to get another person's personal data i.e login credentials, credit card details by telling them to log in the webpage given by them.

Phishing is one of the most happening cybercrimes which uses Email as their medium to reach the other person whose data they want to steal. Phishing is one of the terms of hacking.

6 0
3 years ago
How many seconds are required to make a left turn and join traffic?​
Westkost [7]
In town: 5-8 seconds
On highways: 10-20 seconds
8 0
3 years ago
Read 2 more answers
Why does Brainly say, "We're sorry, but we are not able to complete your registration at this time?" Please tell me, because I r
Rus_ich [418]

just change your age to 13 or above-

6 0
3 years ago
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.
const2013 [10]

Answer:

achieve physical security

Explanation:

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to <u>achieve physical security </u>

3 0
3 years ago
Other questions:
  • When leased computing resources can be increased or decreased​ dynamically, they are said to be​ ________.
    15·2 answers
  • Compare and contrast assertiveness, arrogance and passivity.
    14·1 answer
  • What are rules that we use on the internet called, and what are some of them?
    6·1 answer
  • What component is most likely to be installed in a PC, is considered primary storage, and typically stores the operating system,
    6·1 answer
  • The right to make others do things is referred to as _________.
    14·2 answers
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
  • Who knows songs that are sad,happy,excited, and calm
    10·1 answer
  • Name the major types of computer systems from slowest to fastest. ​
    9·1 answer
  • What is the term for delivering an application over the internet called?
    13·2 answers
  • Multiple Choice
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!