1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
4 years ago
5

On an Ethernet, a ____ is broadcast to every device but is accepted only by the device to which it is addressed.

Computers and Technology
1 answer:
sweet-ann [11.9K]4 years ago
4 0
If the network is wired through a hub, all packets are broadcast to all nodes and only (you hope) accepted by the machine to which it's addressed.

If the network is wired through a switch, then the packets go directly to the machine to which their addressed.
You might be interested in
Select the correct text in the passage.
aliina [53]

Answer: When was admitted, hospital authorities recorded his medical history. Then, placed in an ICU where his vital signs were constantly monitored.

Explanation: With the help of computers, medical histories are often kept in the computer for future reference. Machines are connected to computers to record vital signs.

4 0
3 years ago
Which of these is NOT an example of lifelong learning?
oee [108]

Answer:

B. having lunch with a friend

Explanation:

Lifelong learning can be defined as a continuous, self-motivated, and self-initiated learning activity that is typically focused on personal or professional development. Thus, it's a form of education that is undertaken throughout life with the sole aim of pursuing knowledge, competencies, and skills for either personal or professional growth and development, especially after acquiring a formal education.

Some examples of lifelong learning includes the following;

I. Reading a trade magazine.

II. Reviewing a textbook.

III. Studying an encyclopedia.

7 0
3 years ago
If a destructive program is running that might be destroying evidence what should be done
Vikentia [17]
The choices can be found elsewhere and as follows:
a. perform an immediate full backup
b. attempt to end the process
c. pull the power cable
d. record the destruction using a video capture of the screen

I think the correct answer is option a. If a destructive program is running that might be destroying evidence, then perform an immediate full backup. 
3 0
3 years ago
A data set includes data from 500 random tornadoes. The display from technology available below results from using the tornado l
EastWind [94]

Answer:

The answer is:

H_0:\mu=2.2\\H_1:\mu> 2.2

Explanation:

H_0:\mu=2.2\\H_1:\mu> 2.2

The test value of statistic t= \frac{\bar x-\mu}{\frac{s}{\sqrt{n}}}

                                               =\frac{2.31688-2.2}{0.206915}\\\\=0.56

The value of P = P(T>0.56)

                          =1-P(T<0.56)

                          =1-0.712

                          =0.288

  • Since the P value exceeds its mean value (0.288>0.05), the null assumption must not be rejected.  Don't ignore H0.
  • This assertion, it mean length of the tornado is greater than 2.2 miles also isn't backed by enough evidence.
6 0
3 years ago
What is machine level language ?​
NeX [460]

Answer:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1.

5 0
3 years ago
Other questions:
  • How do air and ocean currents affect climate
    5·2 answers
  • Validating the users claimed identity is called which of the following?A. AuthenticationB. IdentificationC. VerificationD. Valid
    15·1 answer
  • I was walking in the rain with my Tim’s on steeping over puddles full of pain
    7·2 answers
  • What is the full form of IE? ​
    9·1 answer
  • The most important task in developing a new computer system/app is to: a) choose the most current technologies such as operating
    5·1 answer
  • 22. (a) List two arithmetic
    7·1 answer
  • To keep files organized, related documents are often stored in ____ (also called directories) located on the storage medium.
    11·1 answer
  • Why star topology is more reliable than bus or ring topologies
    7·2 answers
  • For which three everyday activities do people most typically use computers?
    11·1 answer
  • The computer-like model used to describe the way humans encode, store, and retrieve information is the ________ model.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!