1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
2 years ago
5

Which layer abstracts away the need for any other layers to care about what hardware is in use?

Computers and Technology
1 answer:
Vlad1618 [11]2 years ago
3 0

Answer:

data link layer

Explanation:

you answer is data link layer

You might be interested in
Why are there 2 types of ip addresses like 172.16.254.1 or 2001:db8:0:1234:0:567:8:1?
solong [7]
The first example is an IPv4 address. Because IPv4 is only 32 bits long there are only about 4 billion addresses available. To expand the address space IPv6 came into existence and your second example is an IPv6 address.
7 0
3 years ago
What does this mean?
8090 [49]

Answer:

That you have just wasted your time typing up a seemingly random number sequence.

4 0
3 years ago
Read 2 more answers
What do file extensions tell you about a particular file? Why can a file have only one type of file extension?
MrMuchimi
It tells u what kind of file it is and also if it were to have two extensions it would interfere and cause it not to work
6 0
3 years ago
The current calendar, called the Gregorian calendar, was introduced in 1582. Every year divisible by four was declared to be a l
Naily [24]

Solution :

Public Function Is a Leap_Year(Year As_Integer) As Integer

'Dim Tor_F for local variable declaring if value is t/f.

Dim TorF As For Boolean

'Pre conditions: Year > 1581 and Year < 3000

If Year > 1581 And Year <> 1700 Or 1800 Or 1900 Then

IsLeapYear = Year / 4

Else

IsLeapYear = False

TorF = False

End If

End Function

8 0
3 years ago
Fill in the blank. THANK YOUU
Svetllana [295]

Answer:

She's procrastinating

Explanation:

3 0
3 years ago
Other questions:
  • The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal infor
    12·1 answer
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • Using computers in place of paper to design components, products, and processes is referred to as ______.
    11·1 answer
  • What are three to five (3-5) key differences and features in Windows Server 2016 versus 2012?
    14·1 answer
  • Define a function UpdateTimeWindow() with parameters timeStart, timeEnd, and offsetAmount. Each parameter is of type int. The fu
    10·1 answer
  • To which of these options does the style in Word apply? Select three options.
    7·1 answer
  • C. There are two types of computer on the basis of size. true or false​
    5·1 answer
  • What is the creative nature of a computer<br> Help
    15·2 answers
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • Examples of the many different ways an app can be used are called use
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!