1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
7

Hubs connect network hosts in which configuration?

Computers and Technology
1 answer:
nataly862011 [7]3 years ago
8 0

Answer:

A high availability hub is not required to enable or use the self-describing agent. You can optionally configure a high availability hub for improved availability and recovery if the hub fails. Network Layer – The network layer is responsible for creating a routing table, and based on the routing table, forwarding the input request. Some of the Devices used in the Network Layer are, Routers: A router is a switch-like device that routes/forwards data packets based on their IP addresses.

Explanation:

(hope this helps can i plz have brainlist :D hehe)

You might be interested in
Easy STEAM question :)
lorasvet [3.4K]

Answer:

Explanation:

A civil Engineer builds buildings, roads and bridges.

4 0
4 years ago
Read 2 more answers
__________ was awarded the Nobel Prize in physics forhis work on the photoelectric effect.
vekshin1

Answer:

Albert Einstein

Explanation:

Hello, great question. It is always good to ask questions and get rid of any doubts.

Albert Einstein was awarded the <u><em>Nobel Peace Prize</em></u> for his work on Photoelectric Effect in the year 1921. Albert Einstein was a physicist who was born in Germany in 1955, and dedicated his life to science. Largely known for his discovery of the <em><u>General Theory of Relativity</u></em>. Einstein won the Nobel Peace prize for discovering that light are formed in packets of energy that travel at in different frequencies or wave lengths.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
9966 [12]

Answer:

Same Browser

Explanation:

If we access some password for some website in from some computer. It will be saved in the browser of the computer. Whenever we access the website from some other computer and we want to login we need the same browser.

In this process, browser is sync by using our mailing address. Whenever we want to access the pasword of different website from some other device, we need to sync that device browser with the same mailing address.

In this process all password that are saved on other device may access from any device.

7 0
3 years ago
The process of arranging the item of a column in some sequence or order is known as?
MatroZZZ [7]

answer: sorting??  

(hope it helps)

6 0
2 years ago
This is your code.
topjm [15]

Answer:

11

Explanation:

the second in the d aray is c because to call the first value, it is d[0]. So, to call c, you put d[2]. And the 0 of the c array, or the 0 of the 2 of the d array, it is 11

put it in a program. I use JS so if you have an Apple, open script editor and change the script from AppleScript to JavaScript and put in this code:

var a = [5, 10, 15];

var b = [2, 4, 6];

var C = [11, 33, 55];

var d = [a, b, C];

d[2][0];

3 0
3 years ago
Other questions:
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • To support continuous improvement efforts in the workplace, you increase the number of tasks that an employee performs and have
    7·1 answer
  • A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report visually, typically
    15·1 answer
  • Can anyone please help with this programming code in python num= 7 if num &gt; 3: print(“3”) if num &lt; 5: print(“5”) if num ==
    6·1 answer
  • The foundation of secure communication on the internet replies on asymmetric encryption, with the use of Public and Private keys
    10·1 answer
  • Help me please. I'LL MARK BRAINIEST
    15·1 answer
  • Jettison folk 2007, Magnum opus, be moving, offers poisoned commentary on the film industry.
    7·1 answer
  • How many pages is 1500 words double spaced 12 font?.
    10·1 answer
  • 1.1 give five (5) reasons why modeling is an important part of system analysis and design
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!