answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paladinen [302]
2 years ago
7

In an ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

Computers and Technology
1 answer:
lbvjy [14]2 years ago
3 0
Hey there! Hello!

I'm certainly not an expert at anything related to ethernet, but I do believe that the answer you're looking for is a jam signal. To my limited understanding, <span>CSMA/CD makes computers "listen" before sending data to see if their signal is currently being used. If it's not, it'll send. The computer and sender will continue to "listen" to see if a jam still occurred afterwards. If one did occur, a jam signal will be sent to everyone who may send something over that signal, warning them not to send anything else, since it will not be successful and may make the jam worse. 

Hope this helped you out! I would normally tell the question–askers that they can ask me any additional questions they may have, but... that's the extent that I know about ethernet, haha! :-)</span>
You might be interested in
You have verified that all your wireless settings are correct. What is most likely the problem if your laptop has recently been
alukav5142 [94]

Answer:

D) The antenna connector is not connected properly

Explanation:

The antenna of a laptop is inside the laptop and it is the antenna that gives access to wireless connection.Since the laptop has just been serviced, the antenna connector could have been inadvertently disconnected hence the antenna would not be able to function and wireless connectivity would not work.

8 0
2 years ago
3. Personal Trainer is very concerned about the security and protection of the information they collect in the new information s
Sever21 [200]

Answer:

Check the explanation

Explanation:

in order to make sure that the built into the new systems, the below input and output levels of security control have to be considered for personal trainers staff.

There are:

   Network Security

   Application security

   Physical security

   User security

   File security

   Procedural security

These securities levels are consistent and advantage in building the decisions regarding system security.

There are the following policies applied to each control:

Network Security: Network interface and traffic controlling, encryption of data.

Application Security: Verification of data input/output and update of software proceedings.

Physical Security: Security to servers, computers and physical environment.

User Security: Protection passwords and identify management skills.

File Security: Access Permission allocated to users and editing authorizations given to users.

Procedural Security: Certify safety protection to perform decision-making activities and document shredders.

Finally, consider another main point is depends the new system performance are system response time, throughput, bandwidth time and turnaround time.

7 0
2 years ago
Create a program named Auction that allows a user to enter an amount bid on an online auction item. Include three overloaded met
Olin [163]

Answer:

Explanation:

The following code is written in Java and creates the overloaded methods as requested. It has been tested and is working without bugs. The test cases are shown in the first red square within the main method and the output results are shown in the bottom red square...

class Auction {

   public static void main(String[] args) {

       bid(10);

       bid(10.00);

       bid("10 dollars");

       bid("$10");

       bid("150 bills");

   }

   public static void bid(int bid) {

       if(bid >= 10) {

           System.out.println("Bid Accepted");

       } else {

           System.out.println("Bid not high enough");

       }

   }

   public static void bid(double bid) {

       if(bid >= 10) {

           System.out.println("Bid Accepted");

       } else {

           System.out.println("Bid not high enough");

       }

   }

   public static void bid(String bid) {

       if (bid.charAt(0) == '$') {

           if (Integer.parseInt(bid.substring(1, bid.length())) > 0) {

               System.out.println("Bid Accepted");

               return;

           } else {

               System.out.println("Bid not in correct Format");

               return;

           }

       }

       int dollarStartingPoint = 0;

       for (int x = 0; x < bid.length(); x++) {

           if (bid.charAt(x) == 'd') {

               if (bid.substring(x, x + 7).equals("dollars")) {

                   dollarStartingPoint = x;

               } else {

                   break;

               }

           }

       }

       if (dollarStartingPoint > 1) {

           if (Integer.parseInt(bid.substring(0, dollarStartingPoint-1)) > 0) {

               System.out.println("Bid Accepted");

               return;

           } else {

               System.out.println("Bid not in correct format");

               return;

           }

       } else {

           System.out.println("Bid not in correct format");

           return;

       }

   }

}

3 0
2 years ago
You learn that in a previous security breach at GearUp, a disgruntled employee destroyed the encryption key that had been used t
lukranit [14]

Answer:

The data can be safeguarded using key escrow procedure.

Explanation:

Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.

6 0
2 years ago
One subtask in the game is to roll the dice. explain why is roll the dice an abstraction.
LUCKY_DIMON [66]

Answer:

A game is built from a combination of sub-tasks in order to provide the best experience to the user and make sure that the interface is comprises of only the results of the ongoing sub-tasks to provide a higher degree of data abstraction.

Data abstraction refers to the process of representing the essential information without including the background details. Rolling a dice is preferred to be a sub-task so that the user only gets to know about the result of the roll and does not have to wait for or anticipate the result. Moreover, a game may consist of n number of sub-tasks so it is not a good idea to include them in the main framework and are preferred to be abstracted.

4 0
2 years ago
Other questions:
  • A search box does all of the following EXCEPT ________.
    12·2 answers
  • "use the ______ element to create logical areas on a web page that are embedded within paragraphs or other block formatting elem
    15·1 answer
  • A user requests an unencrypted webpage from a web server running on a computer, listening on the Internet Protocol address 10.1.
    14·1 answer
  • Assume that we would like to expand the MIPS register file to 128 registers and expand the instruction set to contain four times
    14·1 answer
  • Write the definition of a function power_to, which receives two parameters. The first is a float and the second is an integer. T
    5·1 answer
  • A network router connects multiple computers together and allows them to send messages to each other. If two or more computers s
    7·1 answer
  • 9.6 Code Practice: Question 1
    9·1 answer
  • How does the discussion of “Luddites,” “Marx,” and “John Maynard Keynes” in paragraph 21 contribute to the development of the id
    7·1 answer
  • Write a function that takes a string like 'one five two' and returns the corresponding integer (in this case, 152). A function j
    11·2 answers
  • "There are no longer mature industries; rather, there are mature ways of doing business," he is referring to the high demand of
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!