1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
8

The physical layer of the OSI model is not foundational to any of the other layers. True or False

Computers and Technology
1 answer:
galina1969 [7]3 years ago
5 0

Answer:

False.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

The physical layer of the OSI model is the first layer of the OSI model and it is foundational to any of the other layers because it determines the means of transmitting (sending) raw bits from one network node to another and the electrical specification of network equipments.

You might be interested in
True of False - use T or F The Math class can be instantiated.
Wittaler [7]

Answer:

F

Explanation:

The Math class cannot  be instantiated because it has a private constructor.

However all the methods in the java.lang.Math are static which means that you can invoke them directly without having to instantiate the class. For example:

static int abs(int a) defined in the Math class can be invoked from the calling function as:

int absolute_value = Math.abs(a);

Note that the class Math is also declared as final which means it cannot be extended by any other class as well.

3 0
3 years ago
If a CPU receives theinstruction to multiply the byte-sized values $12 and $3E, thisaction will take place in the ______________
Alex17521 [72]

Answer: Arithmetic and logic unit(ALU)

Explanation:  In central processing unit (CPU) , there are two main units CU(control unit) and ALU (arithmetic and logic unit) . ALU is responsible for any sort arithmetic and logical operation in the processor.This unit can perform mathematical operation like addition , multiplication divide , logical and many more. So the given operation of multiplication in the question will be done bu ALU of the CPU.

6 0
4 years ago
6. What type of application is designed for making slide shows?​
Sonbull [250]
Keynotes is good , PowerPoint
8 0
3 years ago
Read 2 more answers
Ill give Brainliest!!!!! I REALLYYY NEED HELP
salantis [7]

Answer:

 Topic: Alexander the great

        Alexander was born in July 356 B.C. to Philip II and his wife, Queen Olympias.He was tutored by a philosopher named ‘Aristotle’,he taught Alexander about medicine, philosophy, morals, religion, logic, and art.His full name is ‘Alexander ||| of Macedon’.He died on June 323 B.C and people still don't know how he was killed.A lot of people say that he was killed by poison but nobody really has proof.But despite him being killed he was famous for being the King of Macedonia and conqueror of the Persian Empire. He was a great military leader in fact he is one of the BEST known

6 0
3 years ago
Read 2 more answers
A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known a
Elden [556K]

Answer:

The answer is "node".

Explanation:

The network address is known as a logical or physical address, which defines a networking module/device from a network. It is an allocated numerical number, to every device requiring access to the list or is a member of it.

  • In network communication, it uses the nodes for store data, and there address, these addresses are described by the unique numbers.
  • These node stores data packets, which stores encrypted data.  
7 0
4 years ago
Other questions:
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • Which internet resource can you use to publicly describe an adventure trip you recently made?
    6·2 answers
  • (True/False). If the definition of an IS is the medium for recording and storing data, and disseminating information, this would
    12·2 answers
  • What table element represents a field within a record in powerpoint A column B Row C header D footer
    14·1 answer
  • Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
    11·1 answer
  • What is this car first to awnser is the brianliest
    5·2 answers
  • 1. Harold Worden, then 56-years-old, stole Kodak property
    9·1 answer
  • Nadia has inserted an image into a Word document and now would like to resize the image to fit the document befter. What is the
    11·1 answer
  • Consider a student club or organization in which you are a
    14·1 answer
  • ________is the most popular public key algorithm available and can be used for digital signatures, key exchange, encryption, and
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!