1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
13

Frame from one LAN can be transmitted to another LAN via the device is:_____.

Computers and Technology
1 answer:
andreyandreev [35.5K]3 years ago
3 0

Answer:

B) Bridge.

Explanation:

LAN refers to a local area network in which the network of computer are interconnected in less than an area which is limited i.e. school, university, residence, office building, etc

It is used to share a common line of communication within a less geographic area.

In order to transmit one LAN to the another LAN, the device we called as a bridge

Therefore the correct option is B. bridge

You might be interested in
Which of the following is true of how packets are sent through the Internet?
astra-53 [7]

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

8 0
4 years ago
Read 2 more answers
What is 1gb in bits?​
Irina-Kira [14]

Answer:

8e+9

Explanation:

3 0
3 years ago
Read 2 more answers
Write the definition of a function named printpoweroftwostars that receives a non-negative integer n and prints a line consistin
Aleksandr-060686 [28]
To accomplish this without using a loop,
we can use math on a string.

Example:
print("apple" * 8)

Output:
appleappleappleappleappleappleappleapple

In this example,
the multiplication by 8 actually creates 8 copies of the string.

So that's the type of logic we want to apply to our problem.

<span>def powersOfTwo(number):
if number >= 0:
return print("*" * 2**number)
else:
<span>return

Hmm I can't make indentations in this box,
so it's doesn't format correctly.
Hopefully you get the idea though.

We're taking the string containing an asterisk and copying it 2^(number) times.

Beyond that you will need to call the function below.
Test it with some different values.

powersOfTwo(4) should print 2^4 asterisks: ****************</span></span>
4 0
4 years ago
Is the IOT governable by frameworks? Explain your rationale.
polet [3.4K]

Answer:

Absolutely yes.

Explanation:

IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.

Some of the aspects that should be governed by these frameworks are;

i. Data confidentiality:

Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.

ii. Data integrity:

These data should also be assured of consistency and accuracy over a long period of time.

iii. Accountability:

When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.

8 0
3 years ago
________ is a function that removes specific identifying information from query results, such as last name and telephone number,
Musya8 [376]

Answer: Anonymization

Explanation: Anonymization is the mechanism followed on the data for it's security. It is the process in which the data is eliminated on the basis that it is particularly identifiable by the features like last name and other specific features. It is also done by the encryption technique to protect the information. The data that has been specifically identified are specified as anonymous.

4 0
3 years ago
Other questions:
  • The use of digital technology and the Internet to execute the major business processes in the enterprise is called
    11·1 answer
  • What is an effective way to display calculations in a Word document
    7·2 answers
  • 11. Print Layout, Full Screen Reading, Web Layout, Outline and Draft are examples of _______. 12. What do you do if the spelling
    5·1 answer
  • What is a computer network?
    5·1 answer
  • If you want to open the Navigation pane to do a Find, what should you first click on the Home tab? Paragraph, Editing, Styles, o
    15·1 answer
  • Over the past year alone, more than _________ have been stolen from Target.
    10·2 answers
  • No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program
    9·1 answer
  • What are your undertale + au ships?
    15·1 answer
  • Consider the following declaration:
    9·1 answer
  • Write an expression in Boolean algebra that evaluates to 1 when an odd number of bits of the number is 1 and 0 otherwise
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!