1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
8

Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. W

hich device is this? A. NIC B. hub C. modem D. switch E. bridge
Computers and Technology
2 answers:
Sliva [168]3 years ago
6 0

Answer:

B. hub

Explanation:

Hub is a device that connects two or more computers together to make a Local Area Connection (LAN). It receives message and sends it to every computer on the network through a hub cables plugged into it from each computer. It enables each individual computer to partake in the message transfer process and each users can listen to the information. It is typically used at the centre of a star network and it is mostly regarded as an unsecured network.

zysi [14]3 years ago
6 0

Answer:

b

Explanation:

You might be interested in
You have created a new storage space using a single 500 GB external USB 3.0 drive. The drive is becoming full, so you add anothe
Dimas [21]

Answer:

In the clarification section following, the definition including its query is mentioned.

Explanation:

  • I believe we possess 2 other discs except for the major memory card-a USB 500 GB USB 3.0 drive, just one TB USB 2.0 drive. So we're making a two-array mirrored storage space resilience kit. We get a warning when we duplicate files from either the C: drive towards this second adaptation that you should be running out of places.
  • That was because these need to have a backup process around each other discs throughout the situation of a two-way mirror.
  • This serves to protect the organization from disc failure and enhances the overall efficiency of the device. Thus, even when copying, even though only several 100 MB has also been cut and pasted to something like the disc, the disc intercepts that the information collected from either the 500 GB drive as well as the major disc must be stored there. And that is how the alert arrives that throughout the new trip, we're running out of space. So this is how they so easily get the alarm.

3 0
3 years ago
It is important that researchers design rigorous study methods to eliminate: a. inferences. b. the need for a CONSORT flow chart
Zanzabum

Answer: d)biases.

Explanation:In the research field,the biases arise due to the failure in the experiment or some error .It is also known as the experimental bias.

It is the process in which the researchers do the research to produce the output that is desired by them than the actual result. Thus this is also a main reason for the bias factor. So, the scientist should try to eliminate the biases.

6 0
4 years ago
Which formations are created by wind deposition?Select two options
Temka [501]

Answer:

Sand dunes, and maybe you know them things in the middle of the desert where its like a rock pole thingy, that too, i dunno what its called but you should know what im talking about.

Explanation:

7 0
3 years ago
Objects of the BankAccount class require a name (string) and a social security number (string) be specified (in that order) upon
Grace [21]

Answer:

BankAccount account= new BankAccount("John Smith","123-45-6789");

Explanation:

This is how to define an object of a class, in this case BankAccount. You call the class constructor which sets the value for it.

5 0
4 years ago
List 4 activities that might be included as part of a dependable software engineering process. Which of these do you think are m
Bogdan [553]

Answer:

  • Requirement Management
  • Requirement Reviews
  • Requirement Specification
  • System Modeling

Explanation:

Requirement Management  and specification are most suitable for agile project.

7 0
3 years ago
Other questions:
  • using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l
    9·2 answers
  • Which company is credited with solving a problem by creating a program that could work on all computers?
    11·1 answer
  • A polyalphabetic cipher uses many ___
    6·1 answer
  • Assume we perform a known-plaintext attack against DES with one pair of plaintext and ciphertext. How many keys do we have to te
    14·1 answer
  • What lets you change the order of events in a game?
    9·1 answer
  • What are the benefits of maintaining you vehicle?
    11·1 answer
  • In the circuit shown in the figure above, what will happen when switches S1 and S3 are both closed? 
    8·1 answer
  • . Complete the code, drawing a line between points (100, 200) and (34, 67)
    7·1 answer
  • 2
    14·1 answer
  • What are the two major types of sas steps?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!