1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tatiana [17]
3 years ago
5

What is the major function of the network access layer?

Computers and Technology
1 answer:
natta225 [31]3 years ago
5 0
Th network layer is the first layer of the OSI model. It determines the media used (CAT5/6/7/Fibre/Coax). The major function is to communicate with servers and workstations.
You might be interested in
What are programs that are installed without the user knowing
Goshia [24]
Hacks , aim bot wanna play fort nite some time I’m really good at it lol
6 0
3 years ago
what is a paragraph on what i can write on what i learned from watching basic keyboard shortcuts using control functions video
finlep [7]

Answer:

Write the following nonsensical paragraph:

Explanation:

I learned how to navigate the computer efficiently. I learned how to use Ctrl + (key) to quickly do (something). ( Now reword that multiple times with different commands. ) Now I can harness my inner laziness to browse the computer at a faster speed.

6 0
4 years ago
Which of the following actions should you take when turning left at an intersection?
fomenos
The answer is B Okay good luck and dont...mess it up
8 0
4 years ago
Why will it take so long to complete the high-speed rail route?
koban [17]
It will take a while for all of the necessary safety inspections. 
3 0
3 years ago
Read 2 more answers
Why are id thieves hard to catch?
Paladinen [302]
Because they will change their identity and therefore they will never have the same name for a long period of time . So when they commit a crime , they will be difficult to find and catch
5 0
3 years ago
Other questions:
  • Which of the following refers to applications and technologies that are used to gather, provide access to, and analyze data and
    8·2 answers
  • create a 3 to 5 step plan for checking out a post on social media for the next time you encounter something questionable.
    11·2 answers
  • How do you open two different picture in photoshop?
    14·1 answer
  • How many cells does the organism have?\
    5·2 answers
  • What else can Xbox do to help reduce negative online behavior? (250 minimum)
    6·1 answer
  • Use C++:
    9·1 answer
  • What is c also write it's features
    8·2 answers
  • Adobe Indesign project 4 museum indesign file. The instructions are 70 pages long I cant sit still long enough to read them
    11·1 answer
  • Helllllllllppppppppppp
    9·1 answer
  • What does hashing mean when it comes to cryptography?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!