1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
3 years ago
9

What is hub.pls ans from pic. for computers​

Computers and Technology
2 answers:
mars1129 [50]3 years ago
8 0

Answer:

A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.

Explanation:

A hub is less sophisticated than a switch, the latter of which can isolate data transmissions to specific devices. Network hubs are best suited for small, simple local area network (LAN) environments.

schepotkina [342]3 years ago
5 0

<h3>what is hub? </h3>

<h3>✅An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.</h3>
You might be interested in
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
3 years ago
In Excel, you can sort a table by one or more columns by.
timofeeve [1]
Ushsbcjdiosjdhwjwjif math
8 0
3 years ago
Host Y sends the first TCP ACK message for the transaction?<br><br> a. true<br><br> b. false
kupik [55]

Answer: True

Explanation:

 TCP is the transmission control protocol which and TCP ACK is the transmission control handshake method which are used by TCP. It basically indicates the next sequence number in the method when the flag is set.

Firstly, the ACK (Acknowledge) send by the each end for the initial sequence number itself but it does not contained any type of data. In the TCP segment header ACK contain 32 bit field.

The acknowledgement is just a proof to clients that ACK is a specific to the SYN when the clients initiate.

 

8 0
3 years ago
Whats an MAR? lolz better not take my points #bonkers
GaryK [48]

Answer:

\huge\mathcal{\fcolorbox{aqua}{azure}{\red{✿ʏᴏᴜʀ- ᴀɴsᴡᴇʀ ♡❖}}}

<em><u>A Medication Administration Record (MAR, or eMAR for electronic versions), commonly referred to as a drug chart, is the report that serves as a legal record of the drugs administered to a patient at a facility by a health care professional. The MAR is a part of a patient's permanent record on their medical chart</u></em>

4 0
2 years ago
Read 2 more answers
Why people get addited to mobile and by playing games​
nadya68 [22]
Because it is a very fun game and if it is fun people like it
4 0
3 years ago
Other questions:
  • Problem 2 (40 points)-Write a program. Submit a file named weight.cpp Create a program that continuously allows a user to enter
    5·1 answer
  • witch of the following is a good way to choose your location as you develop your study method? A. Going where most of your frien
    6·1 answer
  • If a security officer is non-commissioned officer, he can carry a baton on duty if he went through a training class
    8·1 answer
  • Computer programmers often use binary codes (strings of 1s and 0s) to write programs for computers. These codes are then changed
    6·1 answer
  • You can upgrade a cpu by adding registers and cache memory to it. <br> a. True <br> b. False
    7·1 answer
  • Users report that the network access is slow. After questioning the employees, the network administrator learned that one employ
    7·1 answer
  • WILL UPVOTE &lt;3
    9·1 answer
  • What color is the smartart tolls tab?
    5·1 answer
  • Which of the following is an example of phishing attack? csp
    8·1 answer
  • Why is computer economics important?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!