1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
2 years ago
12

A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over

a shared medium. Examples are a bus-technology local area network, such as Ethernet, and a wireless radio network. Discuss the need or lack of need for a network layer (OSI layer 3) in a broadcast network.
Computers and Technology
1 answer:
love history [14]2 years ago
8 0

Answer:

In a broadcast network such as radio network for example a walkie talkie, the broadcasted transmission is received equally by all receivers indiscriminately which may lead to dissemination of classified information to an unauthorized receiver, therefore, the network layer is required is needed to ensure proper routing of the information

Similarly, when the all the broadcasters in one location are each trying to send messages to different receivers at another given location, there would be potential for network congestion and it would be difficult to send information through the network

When there is need for priority service the presence of a network layer is needed in the network

However, when the above functions performed by the network layer is not required, then, the network layer can be excluded, such as the communication between layers 4 - 7 of the OSI model

Explanation:

You might be interested in
Which aspects of a project do project makers oversee?
Phantasy [73]
Some people look over the extra details needed in the project.
3 0
3 years ago
Read 2 more answers
(C) Describe about the different types of computer<br> peripherals and memory devices.
Alecsey [184]

<em>Computer peripheral device</em>

<em> Monitor.</em>

<em> Monitor. Keyboard.</em>

<em> Monitor. Keyboard. Mouse.</em>

<em> Monitor. Keyboard. Mouse. Trackball.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick. Light pen.</em>

<em> </em><em>MEMORY </em><em>DEVICES </em><em>:</em><em> </em>

<em> </em><em> </em><em> </em><em>The main storage is the primary memory, and data and programs are stored in secondary memory. However, memory is not stored in the CPU, but the CPU would only be a mess of wires without it!</em>

<em>RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. ... Hard Disk, CD, DVD, Pen/Flash drive, SSD, etc, are examples of secondary storage.</em>

<em>Thus</em><em>, </em><em> </em><em>Computer storage is of two types: ... RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. It is mainly used for the permanent and long-term storage of programs and data.</em>

3 0
2 years ago
Torque is defined as _____.
BlackZzzverrR [31]
<span>something that produces or tends to produce torsion or rotation; the moment of a force or system of forces tending to cause rotation.

</span>
5 0
3 years ago
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
2 years ago
What are two example of ways an electronic record may be distributed to others?
murzikaleks [220]
By email or publishing on the internet, I hope that helps!
4 0
2 years ago
Other questions:
  • Tower defense is included under which genre of game
    15·2 answers
  • Why should you log out when you finish an online session?
    9·1 answer
  • What education and training is required to be an applications software engineer?
    9·1 answer
  • PLEASE HELP!<br> How do you "brainliest" an answer?
    13·2 answers
  • Run a Monte Carlo simulation on this vector representing the countries of the 8 runners in this race: runners &lt;- c("Jamaica",
    14·1 answer
  • Which of the following is true regarding the mod operator, %? Group of answer choices It can only be performed on int values and
    8·2 answers
  • Read the scenario below, and then answer the question.
    13·1 answer
  • Why must you be careful when handling a hard drive?
    10·1 answer
  • Which of the following correctly declares and initializes a Scanner object that will use input from the keyboard as its data sou
    13·2 answers
  • What is the second row of letters in the keyboard called?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!