1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
2 years ago
9

Choose the correct option below:Part A1. WAN link 2. Client 3. Server 4. Hub 5. Switch 6. Router 7. Media Part BA. This serves u

p resources to a network.B. It is an older technology that interconnects network components such as clients and servers. It has variable number of available ports. C. It is a device which makes its forwarding decisions based on logical network addresses. D. It might be a workstation, laptop, smartphone with wireless capabilities, or a variety of other end-user terminal devices. E. This device can be copper or fiber-optic cable. F. It interconnects network components, and it has a variety of port densities. It does not simply take traffic in on one port and blast that traffic out all other ports. Rather, it learns which devices reside off of which ports. G. It is the link that interconnects networks.a. 1B, 2D, 3A, 4G, 5F, 6C, 7Eb. 1G, 2D, 3A, 4B, 5F, 6C, 7Ec. 1E, 2D, 3A, 4B, 5F, 6C, 7Gd. 1D, 2G, 3B, 4A, 5F, 6C, 7E
Computers and Technology
1 answer:
lbvjy [14]2 years ago
7 0

Answer:

The correct option is;

b. 1G, 2D, 3A, 4B, 5F, 6C, 7E.

Matching the correct options in PART B in alphabetical order;

1. 3A

2. 4B

3. 6C

4. 2D

5. 7E

6. 5F

7. 1G

You might be interested in
_____ is a form of witty, amusing speech that is often used to bring people together.
Neporo4naja [7]

Answer:Informative

Explanation:

5 0
3 years ago
Read 2 more answers
are the network administrator for your company. You are installing a new printer in the network. When you check the print server
melamori03 [73]

Answer:

Will have to run the net start spooler command.

Explanation:

  • The printer spooler seems to be accountable for overseeing incoming faxes that have been in effect intended for handling by the printer. Whether this device stops operating, your printer won't publish documentation as well as the machine may not notice it either.
  • To solve these problems, you'll need to run the net start spooler command using the least administrative effort.
5 0
3 years ago
Which answer choice correctly distinguishes among the three pieces of data?
wolverine [178]

Answer:

a. 1 is a packet, 2 is data, 3 is a frame.

Explanation:

And what is not  mentioned is segment which used TCP/UDP and is part of Transport layer. The packet carries the destination and sender IP address, and is part of the Network Layer. The frame has the Mac address of destination device and senders device and is part of data link layer.

Hence segment has no IP address, hence b. is not correct. Also, data cannot have the IP Address, and Frame has the MAC address, Hence, the above answer. And this arrangement is part of Data Encapsulation.

Also keep in mind data can be anything like a series of bits, or any and it can or not have a header.

7 0
3 years ago
The IP address and the port are both numbers. Which statement is true?
Tema [17]

Answer:

A computer has one IP address and many ports.

Explanation:

6 0
3 years ago
A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was creat
Nesterboy [21]

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

  • Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.
  • Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.
  • Thus, the given statement is false.
3 0
3 years ago
Other questions:
  • What is the best Graphics Card you can get in a Gaming Computer? Also what is the RAM do in a Comptuer
    6·1 answer
  • Walking paths across the part is represented by the equation why equals -4x - 6​
    9·1 answer
  • If 15 bits are sent in 3 seconds then Bits intervalis__________
    13·1 answer
  • What is the base for a hexadecimal number system?
    11·1 answer
  • What does the binary odometer show about representing large numbers?
    8·1 answer
  • What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation?
    11·1 answer
  • Describe at least three virus scanning techniques
    13·1 answer
  • Examine the exhibit above. "Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub. Which of the following
    13·1 answer
  • When clients connect to a web server using the _________ method, the server logs them on using the iusr account, by default?
    14·1 answer
  • What is the Microsoft excel window where you work on. And it composed of three worksheet?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!