1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr Goodwill [35]
3 years ago
13

OSI layer for HDLC??​

Computers and Technology
1 answer:
tresset_1 [31]3 years ago
3 0

Answer:

HDLC is one of the most commonly used internet protocols (IP) in what is Layer 2 of the industry communication reference model called Open Systems Interconnection (OSI).

Explanation:

You might be interested in
How can you tell if a hacker has administrative access?
olga55 [171]
I don't think you can know because if the hacker is smart he or she will know to cover up their tracks
8 0
3 years ago
Read 2 more answers
Write an expression that evaluates to 1 more than the value in the location pointed to by the integer pointer variable ip. Thus,
kompoz [17]
*ip+1
ip is a pointer to int
*ip is that   int   so *ip+1 is the value at ip  plus 1
6 0
3 years ago
Buying the newest phone as soon as it is released when your current phone works perfectly is not a good idea for all but which o
bixtya [17]

Answer:

You are gonna waste money and it might not be the best idea

Explanation:

5 0
3 years ago
Read 2 more answers
What component uses thermal paste to attach the heat sink?
natka813 [3]

Answer:

Thermal Compound/Thermal Grease

Explanation:

Thermal compound, also known as thermal paste and thermal grease, is a material used to fill the microscopic gaps between a computer's CPU and its heat sink. Thermal compound significantly increases the heat sink's ability to cool the CPU, allowing the CPU to run at a higher speed and improve system performance.

6 0
3 years ago
Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
VARVARA [1.3K]

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

8 0
2 years ago
Other questions:
  • Why is it important to know much time you spend on task
    8·1 answer
  • To easily add an organizational chart to a document, users should select _____. SmartArt Text Boxes Shapes Clip Art
    8·2 answers
  • Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete
    8·1 answer
  • How many points are in an inch? <br> A 24<br> B 50<br> C 72<br> D 100
    5·1 answer
  • Which animation effects allow text or images to show movement on a slide? Check all that apply. Entrance, Emphasis, Exit, Motion
    5·2 answers
  • Bobbi owns a protein shake company, which has been trading for 3 years. Her products are stocked in a number of gyms, but the co
    11·1 answer
  • Look at the following function prototype. double mynewFunction(int); What is the data type of the function’s return variable?
    11·1 answer
  • Who invented Leibnitz calculating machine ?
    12·1 answer
  • What is the standard unit used to measure mass?​
    9·1 answer
  • he superclass Student contains: a constructor that accepts a String corresponding to the name of the school the student attends
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!