1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr Goodwill [35]
3 years ago
13

OSI layer for HDLC??​

Computers and Technology
1 answer:
tresset_1 [31]3 years ago
3 0

Answer:

HDLC is one of the most commonly used internet protocols (IP) in what is Layer 2 of the industry communication reference model called Open Systems Interconnection (OSI).

Explanation:

You might be interested in
What is the advantage of taking notes in a digital format? The technology protects digital notes from being copied. Digital note
VMariaS [17]

Answer:

Technology allows digital notes to be shared on the Internet.

Explanation:

6 0
3 years ago
Read 2 more answers
"Why learning how to type is so important.
djverab [1.8K]
The productivity of a business depends on how things are done faster. To complete your work faster it is important to develop typing skills. Typing helps you to work comfortably on the computer, it aids in communicating with colleagues and customers, creating documents, and finding new information.
Hopefully this helped.
8 0
3 years ago
Write a function called getChar that has no function inputs, but takes in two character inputs from the user (in1 and in2) and o
bearhunter [10]

Answer:

def getChar():

   while True:

       in1 = input('Enter first char: ')

       try:

           if len(in1) != 1:

               raise

           else:

               in2 = input('Enter second char: ')

               if len(in2) != 1:

                   raise

               else:

                   break

       except:

           print('Enter just one character')

   return in1, in2

def chars2string(in1,in2):

   print(in1*5 + in2*5)

def main():

   ls = getChar()

   in1 = ls[0]

   in2 = ls[1]

   chars2string(in1, in2)

if __name__ == '__main__':

   main()

Explanation:

The programming language used is python 3.

The script first defines a function getChar and makes use of a while loop in combination with try and except blocks and IF statements, the code ensures that both inputs that are entered by the user after the prompt are 1 in length. i.e. Just one character. This function returns the two characters that were entered.

The second function that is defined is chars2string this function takes two arguments, It repeats each argument five times and returns a joined string.

Finally, the main function is defined and it calls the getChar function  first, the values that are returned by this function is assigned to two variables, that is then passed on to the chars2string function. The main function is called and the Joined string is printed to the screen.

3 0
3 years ago
Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the following commands will co
svlad2 [7]

Answer:

The best answer is "B"

xfs_fsr

Explanation:

The is a typical format of the command to use:

xfs_metadump -o /dev/sdb1 /reviewxfs

6 0
3 years ago
Read 2 more answers
Identify the term that refers to the right to control access to ourselves and to our personal information.
g100num [7]

Answer:

Privacy

Explanation:

In the privacy control access mechanism it control the data of the personal information.The model P-RBAC that is the framework of key component that extended the RBAC model that gives the complex  policy of privacy such as obligations.In the P-RBAC we defined the privacy awareness permission.

The privacy control access mechanism giving the right to control the personal information.

7 0
2 years ago
Other questions:
  • What could prevent earmuffs from providing your ears good protection from noise?
    10·1 answer
  • Why computers are called "COMPUTER"?
    12·1 answer
  • A tool that is used to search for and gather data from a page on the internet is called a ?
    11·2 answers
  • Which property is assigned to a file by the operating system?
    13·1 answer
  • Explain how to number text in a document​
    7·2 answers
  • Why is it uncommon for users to perform searches directly in database tables?
    15·1 answer
  • ___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
    15·1 answer
  • Disadvantages of computer. ​
    9·1 answer
  • In 3-5 sentences describe to me in detail how you can make a change and better our online community. What are steps would you ta
    8·2 answers
  • What are two potential benefits of using calendar-synchronization tools like calendly
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!