answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
2 years ago
12

A Local Area Network (LAN) uses Category 6 cabling. An issue with a connection results in a network link degradation and only on

e device can communicate at a time. What is the connection operating at
Computers and Technology
1 answer:
dlinn [17]2 years ago
6 0

Answer:

Half Duplex

Explanation:

Half duplex is one way connection. It entails that while you are sending you can't receive and while you are receiving you can't send. A typical example is walkie-talkie.

You might be interested in
True or false words spelling and grammar check is always %100
OverLord2011 [107]
I don't quite understand what you are asking but if you are asking if word, spelling and grammar checkers are always 100% accurate then that is false :) 
6 0
2 years ago
Read 2 more answers
During the boot process, what does the processor do after the computer circuits receive power?
ZanzabumX [31]

Answer:

When ROM receives power, its ROM BIOS instructions are activated and they load the operating system into RAM. This startup sequence is referred to as the boot process. After the operating system is loaded, the computer can accept input, display output, run software, and access your data.

8 0
2 years ago
A new company starts up but does not have a lot of revenue for the first year. Installing anti-virus software for all the compan
Feliz [49]

WAN domain which stands for Wide Area Network and consists of the Internet and semi-private lines. The <span>RISKS are: Service provider can have a major network outage, Server can receive a DOS or DDOS attack</span> and A FTP server can allow anonymously uploaded illegal software.





7 0
2 years ago
In an IPv4 datagram, the fragflag bit is 0, the value of HLEN is 5 (Its unit is word or 32-bits ), the value of total length is
Karolina [17]

Answer:

i aint sure

Explanation:

3 0
2 years ago
The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
Talja [164]
<span>In the scenario in which the IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously the DDoS security attack is occurring.
</span>DDos stands for Distributed Denial of Service<span> . This </span><span>attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.</span>
8 0
2 years ago
Other questions:
  • What was one important academic skill the blogger learned?
    9·1 answer
  • Write a program in c or c++ to perform different arithmeticoperation using switch statement .the program will take two inputinte
    10·1 answer
  • Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key sh
    10·1 answer
  • The elements of an integer-valued array can be initialized so that a[i] == i in a recursive fashion as follows: An array of size
    10·1 answer
  • Consider the following 3-PARTITION problem. Given integers a1; : : : ; an, we want to determine whether it is possible to partit
    10·1 answer
  • Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require
    9·1 answer
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) T
    12·2 answers
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
  • Write a method so that the main() code below can be replaced by simpler code that calls method calcMilesTraveled(). Original mai
    11·1 answer
  • An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!