answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
2 years ago
10

You have installed a device at the physical layer. All of the systems you connect to this device will talk to each other at the

same time. What have you installed?
Computers and Technology
1 answer:
9966 [12]2 years ago
8 0

Answer: Hub

Explanation:

Hub is a electronic and networking device that is placed in a network to maintain a common link with the multiple attached devices. Hub is situated at the physical layer of the Open systems interconnection(OSI) model.

  • Hub is used for creation of link between numerous local area network sections as it persist various ports which replicates data packet and distributes to other ports.
  • There are different types of hub for different purpose of connection such as USB hub, Ethernet hub etc.  

You might be interested in
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
2 years ago
A(n) ______of the audio or video clip makes the content easily accessible to people with hearing disabilities.
defon

subtitles

hope that helped you

7 0
2 years ago
Read 2 more answers
Which of the following statements regarding critical paths is true? a. On a specific project, there can be multiple critical pat
iVinArrow [24]

Answer:

Option a

Explanation:

The Critical Path Method is the arrangement of booked exercises that decides the term of the task. These planned exercises must be performed if the venture is to be viewed as a triumph.

Therefore, options b, c, d and e can't be true because:

b. Activities in the Critical Path Method has no or zero slack.

c. The duration of the critical path in CPM determined on the basis of the latest activity and the earliest initiation.

d. The CPM method schedules the activity of the longest duration.

7 0
2 years ago
Which is true for a hosted blog software
professor190 [17]
Since you have not provided the choices wherein I will have to choose from to arrive at an answer, I will just explain to you the concept revolving around a hosted blog software. Hosted blog software are basically installed by the owner of the web server in which among its famous platforms is the Blogger.
7 0
2 years ago
Read 2 more answers
Which one of the following would be considered a fixed cost of operating a motor vehicle?
lana [24]
What are the choices

8 0
2 years ago
Other questions:
  • Shirley was unsure about what career to go into. Her high school counselor suggested a personal assessment to point out Shirley’
    12·2 answers
  • Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
    11·1 answer
  • Prove that f(n) = 20n3 + 10nlogn + 5 is O(n3)
    12·1 answer
  • All of the following are specific security challenges that threaten corporate systems in a client/server environment except:
    14·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    8·1 answer
  • What is retrieved from a search containing two terms separated<br> by the AND operator?
    12·1 answer
  • Create a program that includes a function called toUpperCamelCase that takes a string (consisting of lowercase words and spaces)
    9·1 answer
  • Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
    5·1 answer
  • Find the sum of the squares of the integers from 1 to MySquare, where MySquare is input by the user. Be sure to check that the u
    6·1 answer
  • 2. BIOS is contained in ROM and not in RAM. Can you guess why?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!