1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kherson [118]
3 years ago
9

g A peer-to-peer PLC network: has no master PLC. uses the token passing access control scheme. each device is identified by an a

ddress. all of these.
Computers and Technology
1 answer:
REY [17]3 years ago
4 0

Answer:

All of these

Explanation:

A peer-to-peer network is a type of computer network that computer devices directly to each other, sharing information and other resources on the network.

It does not have a centralized database, there are no master or slave as each device in the network is a master on its own, and the devices all have unique addresses assigned statically for identification.

You might be interested in
A user is trying to delete a file located on an ntfs volume on his windows 8 computer but is unable to do so. Why is this.
dezoksy [38]

It happened because the window files on that users pc are corrupted and deleted so the user needs to reinstall the windows and then after he should be able to remove that file from his PC.

If the above thing didn't work, follow the following steps.

- Click the start button ,type in cmd then it will show you a command prompt program icon, right click on that and open it by using the administrator rights. Once the program opened then type in chkdsk /f and hit Enter to automatically scan your computer for any corrupted files/ folders upon the restart of the computer.

This will be definitely helpful for you.

4 0
3 years ago
What will empty the log of Internet sites you have recently viewed
melomori [17]
On google- on the top right of the screen, there is a box with a number on it that will show how many tabs you have up. Click on it and empty the sites.
On your phone- If it's an Iphone, you double click the button on your phone.
6 0
3 years ago
Read 2 more answers
Which Packet Tracer feature do you think will be most helpful for you in learning how to manage a network
Norma-Jean [14]

Answer:

Its ability to sniff and analyze packets in a network.

Explanation:

Network administrators require advanced skills and tools to manage a large network, to analyze packets as they are transmitted across the network.

Packet tracer helps to monitor the network connection and packet transfer. It informs the administrator of a dropped connection, slow transmission due to a bottle-neck, and many more packet related issues

7 0
3 years ago
You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the
Temka [501]

Answer:

The answer is (B) Maximum password age.

Explanation:

To prevent several changing of passwords by a user in a day, the maximum times a password can be rest within a day is normally set by  the system administrator.

The setting ensures the password is returned to the current settings of the password on the system for the user and prevents unnecessary changing of passwords in a day by user.

6 0
4 years ago
Read 2 more answers
Enlist the various data analysis methods for study of Infrasonic waves, Seismic waves, Earthquake prone areas and how AI can be
snow_tiger [21]

Answer:

Throughout the clarification segment below, the essence including its query is mentioned.

Explanation:

  • The analytical techniques utilize magnetic fields that allow the waves to be analyzed.
  • They sometimes use echolocation strategies.
  • It is possible to be using artificial intelligence to research potential forecasts. Climate, improvements throughout the climate as well as other things.
  • Like toxic waves, this will be capable of predicting tides.
5 0
3 years ago
Other questions:
  • In the following statement:
    12·1 answer
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • In what year did commercial use of the Internet become available? 1991 1996 1999 2001
    9·1 answer
  • true /falseCompression of entries in the term-document matrix can be used to reduce run-time storage and execution-time requirem
    10·1 answer
  • Select the correct answer. Which sentence best describe an effective management strategy? A. Conceal game-related clippings prio
    12·2 answers
  • Assume that the following code exists inside a method of SomeClass, and that this code compiles without errors:
    13·1 answer
  • Asian-American men are often represented in the media as _____.
    8·2 answers
  • In a List of Positive Integers, Set MINIMUM to 1. For each number X in the list L, compare it to MINIMUM. If X is smaller, set M
    11·1 answer
  • 8
    7·1 answer
  • you are asked to create a four-digit code using the numbers from 1 to 9. how many possible codes are there--assuming that number
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!