1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
9

Choose the correct option below:Part A1. WAN link 2. Client 3. Server 4. Hub 5. Switch 6. Router 7. Media Part BA. This serves u

p resources to a network.B. It is an older technology that interconnects network components such as clients and servers. It has variable number of available ports. C. It is a device which makes its forwarding decisions based on logical network addresses. D. It might be a workstation, laptop, smartphone with wireless capabilities, or a variety of other end-user terminal devices. E. This device can be copper or fiber-optic cable. F. It interconnects network components, and it has a variety of port densities. It does not simply take traffic in on one port and blast that traffic out all other ports. Rather, it learns which devices reside off of which ports. G. It is the link that interconnects networks.a. 1B, 2D, 3A, 4G, 5F, 6C, 7Eb. 1G, 2D, 3A, 4B, 5F, 6C, 7Ec. 1E, 2D, 3A, 4B, 5F, 6C, 7Gd. 1D, 2G, 3B, 4A, 5F, 6C, 7E
Computers and Technology
1 answer:
lbvjy [14]3 years ago
7 0

Answer:

The correct option is;

b. 1G, 2D, 3A, 4B, 5F, 6C, 7E.

Matching the correct options in PART B in alphabetical order;

1. 3A

2. 4B

3. 6C

4. 2D

5. 7E

6. 5F

7. 1G

You might be interested in
What is an IP address and where I can find the IP address for my computer?
pantera1 [17]

Answer:

a) and b) are correct.

Explanation:

You can also type ipconfig on windows terminal to see your ip address - or ifconfig if you are running linux / macos terminal.

3 0
3 years ago
Plane eyes I don't know
FrozenT [24]
IFLY is probably what it was.
3 0
3 years ago
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
Use JavaWrite a program that will simulate a change machine found at cash registers. Input the amount due and amount paid from t
Ksju [112]

Answer:

Here is the JAVA program:

import java.util.Scanner;  //to accept input from user

public class Main { // class name

 public static void main(String [] args) {  // start of main method

   Scanner input = new Scanner(System.in);  // creates Scanner class object to take input from user

   System.out.println("Please Enter the Cost of the Item: ");  // prompts user to enter the cost of item

   double itemCost = input.nextDouble();  //scans and reads the input value of item cost

   System.out.println("Please Enter the Amount Paid: ");  // prompts user to enter the amount paid

   double amount = input.nextDouble();  //scans and reads the value of amount from user

   int change = (int)(amount * 100 - itemCost * 100);  //compute the remaining amount i.e. change

   System.out.println("Change Owed: " + change / 100.0);  // displays the owed change

   int quarters = change / 25;  // computes the value for quarters

   change = change % 25;  // compute the quarters remaining

   int dimes = change / 10;  //  computes dimes

   change = change % 10;  //  computes dimes remaining

   int nickels = change / 5;  // computes nickels

   change = change % 5;  // compute nickels remaining

   int pennies = change;  // computes pennies

   System.out.println("Quarters: " + quarters);  // displays computed value of quarters

   System.out.println("Dimes: " + dimes);  // displays value of dimes

   System.out.println("Nickels: " + nickels);  // displays value of nickels

   System.out.println("Pennies: " + pennies);   }} //displays value of pennies

Explanation:

I will explain the program with an examples.

Suppose the user enters 4.57 as cost of the item and 5.00 as amount paid. Then the program works as follows:

Change is computed as

change = (int)(amount * 100 - itemCost * 100);

This becomes;

change = (int)(5.00 * 100 - 4.57 * 100)

            = 500 - 457

change = 43

Now the change owed is computed as:

change / 100.0 = 43/100.0 = 0.43

Hence change owed = 0.43

Next quarters are computed as:

quarters = change / 25;

This becomes:

quarters = 43/25

quarters = 1

Now the remaining is computed as:

   change = change % 25;

This becomes:

   change = 43 % 25;

  change = 18

Next the dimes are computed from remaining value of change as:

dimes = change / 10;

dimes = 18 / 10

dimes = 1

Now the remaining is computed as:

   change = change % 10;

This becomes:

   change = 18 % 10

  change = 8

Next the nickels are computed from remaining value of change as:

nickels = change / 5;

nickels = 8 / 5

nickels = 1

Now the remaining is computed as:

   change = change % 5;

This becomes:

   change = 8 % 5

  change = 3

At last the pennies are computed as:

pennies = change;

pennies = 3

So the output of the entire program is:

Change Owed: 0.43                                                                                                                Quarters: 1                                                                                                                      Dimes: 1                                                                                                                         Nickels: 1                                                                                                                       Pennies: 3  

The screenshot of the output is attached.

7 0
3 years ago
A deleted file or folder is not permanently deleted from a computer until which event occurs?
Dimas [21]

Answer:

The computer is restarted. The Recycle Bin or Trash is emptied

Explanation:

8 0
3 years ago
Other questions:
  • An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne
    11·1 answer
  • A blank is a link on a web page that leads to another web page.
    14·1 answer
  • What does the Additional Clock tab do?
    11·1 answer
  • How to get the absolute value in coding begginners?
    13·2 answers
  • What do the following standards cover?
    7·1 answer
  • What other options are there besides jail for 16 year old that commit a crime?
    8·2 answers
  • Computer technology has changed our lives write of a least five ways to show how this is so​
    15·1 answer
  • 4.8 code practice question 2
    10·1 answer
  • 7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
    8·1 answer
  • You are considering using Wi-Fi triangulation to track the location of wireless devices within your organization. However, you h
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!