1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
4 years ago
8

A switch operates in the OSI reference model __________ layer and uses the __________ address to forward packets.

Computers and Technology
1 answer:
xenn [34]4 years ago
8 0

Answer:

A switch operates in the OSI reference model <u>data link</u> layer and uses the <u>MAC </u>address to forward packets

Explanation:

A network switch used in wired physical network connection, has several ports and acts as the bridge in the network of computing devices with a port naming system based on MAC addresses to forward data receives at the OSI model data link layer. By incorporating the capability of routing, switches can forward data at the network layer, known as layer 3.

You might be interested in
What is the exclusive legal right granted to all authors and artists that gives them sole ownership of their work to print, publ
Arisa [49]
The answer is copyright like for example if you copy and paste a essay offline and don’t give credit to the author it called copyright
7 0
3 years ago
Read 2 more answers
What keyboard command opens the Go To dialog box?
Harlamova29_29 [7]

If you mean the search for a phrase or word function on a page,

Left Ctrl + F

7 0
4 years ago
Read 2 more answers
Which team won the first World Series ?
Ulleksa [173]
Boston Red Sox, Boyo
5 0
4 years ago
Read 2 more answers
If all humans started from one tiny cell why do you think we all look and act differently
scZoUnD [109]
The one cell evolved into different categories by adapting to its human/animal/plant’s habitat
3 0
3 years ago
What does limited access to a document mean?
Vlad [161]

Answer:

D. It does not reflect any changes made in the document

Explanation:

A limited access is usually done by middle level and top level managers in an organisation to prevent other staff member to edit or make changes to confidential documents when they are out of the office, though the staff can read it, they can not make changes to it.

6 0
3 years ago
Read 2 more answers
Other questions:
  • The item in this illustration that is highlighted is the _____. quick access tool bar view buttons status bar zoom control
    10·2 answers
  • Programmers use _____ languages in the Rapid Application Development (RAD) methodology to facilitate code reuse?
    5·1 answer
  • What does software alone enable a computer to do? connect to the Internet control processing speeds interact with the user manag
    11·2 answers
  • Which one of the following rules for selecting a password is the best?
    5·2 answers
  • Consider the following classes: public class Vehicle {...} public class Car extends Vehicle {...} public class SUV extends Car {
    8·1 answer
  • I'm 11, except my profile says I'm 15.
    15·1 answer
  • jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
    11·2 answers
  • The _____ of a local variable is the function in which the variable is created.
    6·1 answer
  • 12. When computer professionals take on jobs, they may not enter into relationships with which of the
    6·1 answer
  • What are common considerations businesses need to make before purchasing new computers? Check all of the boxes that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!