List 2 differences between routing messages and broadcasting messages


Answers

Answer 1

Answer:

Hub is an example of a broadcast device.

Switch is an example of a multicast device


Related Questions

Select the correct answer.

Which statement is true with respect to Java?

Answers

Answer:

where are the options ..... to select

excuse me i am going into my A levels and i need help in picking what further pure mathematic units i need to pick since i am studying ICT.

Answers

Answer:

i dont know bout math units but subjects for ict include

microcomputer technology, and systems resource management ,computer systems organization.

Explanation:

Order the steps to describe how to attach a contact to a new email

Answers

Answer:

confirm image correct

Explanation:

what is the most common type of storage device for transferring files from one computer to another?

Answers

Answer:

USB flash drives is the most common type of storage device for transferring files from one computer to another

where should the works cited page appear in the document?

Answers

Answer:

The Works Cited Page should be the last page of the documents (and it should be a separate page on its own, not just at the bottom of the essay).

please help

suppose you work for a large company create a short memo letting your coworker know that July 3 is also a paid holiday​

Answers

From: Tom Pearson, Manager, District Five

Regarding: New Incoming Manager, Geraldine Hines

Dear Comstock Staff: Beginning March 15, 2018, you will have a new District Five Regional Manager. After 35 years of continuous service, I am leaving all of you to pursue an exciting future.

It has been my pleasure to train my successor, Geraldine Hines, this past year. Geraldine has demonstrated that she shares the company vision to be the employer of choice here in the Valley of the Sun. I am confident that she will lead all of you into the stratosphere as we merge our call centers and expand our donor site availability.

Please give Geraldine the same level of excellence you have given to me, to our staff and to our donors.

Sincerely.

Tom Pearson, Outgoing Manager, District Five

Prereading strategies involve ООО introducing a text. previewing a text. summarizing a text. interpreting a text. ​

Answers

Answer:

A.

Explanation:

Mark Brainliest if correct!

Answer: Previewing a text. (C)


Explanation: Just got it right.

the fast speed of _______ available today enable computers to work very fast​

Answers

Answer:

main hardware components such as:

1. CPU

2. RAM

3. Motherboard (bus speed)

4. Hard drive

5. Video Card

6. Cache

7. Latest operating system (Windows XP, Windows 10, etc.)

A_______VPN connection is a private network that uses a public
network to operate.

A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site

Answers

Answer:

letter c. point to site po sagot diyan

Describe the type of gameplay seen during early video games

Answers

Answer:

2d?

Explanation:

It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.

Answer: Arcade Machines

The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.

Order the steps to describe how to access the Electronics Business Card dialog box.

Answers

Answer:

posting it fren.  your order is correct

Explanation:

The Electronics Business Card dialog box is a feature in Microsoft Outlook that allows you to create and manage virtual business cards. Here are the steps to access the Electronics Business Card dialog box:

How to access the Electronics Business Card dialog box ?

Open Microsoft Outlook on your computer.

Click on the "File" tab located in the top left-hand corner of the screen.

From the drop-down menu, select "Options".

In the Options window, select "Contacts" from the left-hand menu.

Scroll down to the "Create contacts" section and click on "Electronic Business Cards".

In the Electronic Business Card Editor, you can create and manage your virtual business card by adding or editing the fields as needed.

Once you have completed making changes, click on "Save & Close" to save your electronic business card.

By following these steps, you can easily access the Electronic Business Card dialog box and create or manage your virtual business card in Microsoft Outlook.

Learn  more about Electronics Business Card here

https//brainly.com/question/19446197

#SPJ3

Consider the plain text ALLTHEBEST with key values 4,19,3,2,3,4,12,5,11,4 what will be the cipher text after applying vigenere cipher.

Answers

hi bae systems applied to the relationship

Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?

Answers

Answer:

OOP TY!

Explanation:

TY

Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed. An Ethernet network can only have one active path at any time. Both frames and packets are prevented from being retransmitted through a network indefinately due to the TTL feature. STP is used to prevent Ethernet network performance degradation. An IP network can only have one active path at any time.

Answers

Snhahshshshshshhshshshsshhshshshshhs

A mouse that emits and sense light to detect its movement is called an _______________ mouse.​

Answers

The answer is: “optical” mouse

Explanation:

optical mouse:

uses devices that emit and sense light to detect the mouse's movement

what did the person using the windows command prompt do during round 1

Answers

The windows command prompt is a an interpreter found in Microsoft computers that executes lines of code or commands given by the user if they are valid.

As a result of this, there are different commands which can be given by the user administrator to the windows command prompt which enables them to:

List the hardware information in the computerShow/Check Networking informationScan for viruses or repair bad system files,  etc

Please note that your question is incomplete, so I gave a general overview which should help you get the right answer.

Read more here:

https://brainly.com/question/12787942

Complete the sentence.
A(n)
A. Accessibility document
B. User manual
C. Code library
D. Version control document keeps track of the version numbers of an app and what changes were made váth each
version

Answers

Answer: D Version control document

Explanation: right on cs

A version control document keeps track of the version numbers of an application and what changes were made in each version.

What is version control?

Version control can be defined as a process through which changes to a document, file, application and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future.

In Computer technology, an example of a version control system that is commonly used by software developers across the world is Git.

Read more on version control here: https://brainly.com/question/22938019

#SPJ2

At the top right of the first two pages
only (title page and abstract), insert
page numbers into the header using
lowercase Roman numerals (i, ii).
At the top right of the remaining
pages, insert default page numbering
(1, 2, 3) into the header, beginning
with the number 1 on page 3.

Answers

You don't have the pages. Try re-uploading the question with them.

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

Why would you browse by entering a URL rather than use a link in a Web page

Answers

Answer:

Rather than entering a URL in a web browser, I prefer to browse the webpage. Because if you do browse in the browser you can see other alternative options to that website.

What is the unique name given to a class called?

Answers

Answer:

A class is an extensible program-code template for creating objects.

Source: https://en.wikipedia.org/wiki/Class_(computer_programming)

,  Hope this helps:)

Have a great day!!

describe accessibility in Windows 7 ​

Answers

Answer:

Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.

1. Define the term Intranet.
2. List three advantages of the intranet.
3. List three disadvantages of the intranet.
4. Briefly define the term extranet. 2marks
5. List three advantages of the extranet.
6. List two disadvantages of the extranet.

Answers

Answer:

1.a local or restricted communications network, especially a private network created using World Wide Web software.

2.Enhanced employee engagement.

Increased productivity.

Better connection and collaboration of distributed employees.

Streamlined communication of change management.

Establishing and reinforcing a strong company culture.

Efficient time management.

3.Costly and timely implementation. Intranet can be very costly and time-consuming to implement.

Complexity and heavy admin burden.  

Poor user experience.  

Low user adoption.  

Time-consuming information search.  

Internal use only.  

Lack of employee advocacy.  

Hard to measure success and effectiveness.

4.An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.

5.Information sharing is simple. Without a client extranet, you're likely sharing files with outside parties via email.  

Documents are safe and secure.  

Project management is easy.  

Setup and training require little to no IT involvement.  

Professional branding makes a great impression.

6.Cost. It is no doubt that extranet involves direct expenses such as hardwares, softwares and training of employees.  

Maintenance. Both extranet implementation and maintenance is made expensive within an organization.  

Dependency.  

System Protection.  

Communication Delay.  

User Friendliness.

Explanation:

Easy Question I will make you brainless Just answer this 10 question!!.​

Answers

Answer:

Utility knife - basket

Old newspaper - basket

Strong scissor-Sc

Clean soda can-Sc

Stapler - B

Scissor-basket

Push pin - Sc

Masking tape - Sc

Pin black-Sc

Glue-basket

Easy Question I will make you brainless Just answer this 10 question!!​

Answers

Answer:

B

Sc

B

Sc

B

B

Sc

B

Sc

Sc

Explanation:

Not positive sorry if its not 100% correct

what does your dns server might be unavailable mean?

Answers

Answer:

flush your dns

Explanation:

write down the steps to start computer.​

Answers

Answer:

To start a Desktop PC:

Ensure the PC is plugged in.  

Press the power button.  

Let the computer start.

When prompted, insert the password if you have one set.  

To start a laptop:

Press the power button.

Let the laptop start.

When prompted, insert the password if you have one set.

what is the term used to describe with you connect your phone to another device to share internet access?

Answers

Answer:

This is hyped as the Internet of Things (IoT). Sometimes also called IoE, the Internet of Everything.

Explanation:

you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?

Answers

When one is  typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.

Computer data storage can be regarded complex system, immediately a data is saved then;

The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers,

The hardware will record this saved numbers inside the computer.

These numbers are then  organized and transferred to temporary storage which be manipulated by programs, or software.

Therefore, data are been stored as 1s and 0s in the computer.

Learn more at:https://brainly.com/question/21571591?referrer=searchResults

what does a exponent do in excel ?​

Answers

Answer:

Exponents in Excel are one of the oldest concepts in Mathematics and are a very powerful one as you have to deal with powers. They are basically a shorthand notation for repetition or to depict how many times a number is getting multiplied to itself.

Explanation:

Other Questions
Gain is calculated on the selling price. t or false Find the lines that foreshadow Beowulfs death. Quote and include line numbers with your answer. Where you attend college could costmore to borrow and refinance loans In the tragedy of romeo and Juliet, Juliet drinks the sleeping potion despite her fears. What does this reveal about her character? Has she changed from the beginning of the play, before she met romeo? __________________________ a. A laboratory in a major university surveys all the reactions involving bromine. __________________________ b. A pharmaceutical company explores a disease in order to produce a better medicine. __________________________ c. A scientist investigates the cause of the ozone hole to find a way to stop the loss of the ozone layer. __________________________ d. A pharmaceutical company discovers a more efficient method of producing a drug. __________________________ e. A chemical company develops a new biodegradable plastic. __________________________ f. A laboratory explores the use of ozone to inactivate bacteria in a drinkingwater system. A gas turbine power plant is being designed using an air-standard Brayton cycle. Air enters the compressor with a volumetric flow rate of 7 m3 /s at 100 kPa, 300 K. The turbine inlet temperature is expected to be 1400 K. The compressor pressure ratio is 10. The turbine exhaust goes back to the atmosphere at 100 kPa. (a) Draw the schematic and T-s diagrams. (b) Determine the thermal efficiency. (c) Determine the back work ratio of this power plant. Drinks with high levels of sugars can cause dehydration in hot environments. what are the two main components of crispr technology? why judiciary called the guardian of the country? Give long answer. Perform the indicated operation. Reduce to lowest terms if possible.2 1/2 x 2 1/3 what is one of Hamilton's arguments in favor of a four year term for presidents? What was a drawback of the Prohibition Act? 15.3 Determine the mass of the following: 15.3.1. 2 mol calcium atoms 15.3.2. 0,3 mol nitrogen molecules 15.3.3. 0,5 mol table salt 15.3.4. 0,2 mol hydrochloric acid 15.3.5. 0,08 mol sodium carbonate (Na2CO3)15.3.6. 0,25 mol ammonium sulphate (NH4)2SO4 If x=19 and y=8, find y when x=38 How do you spot bias?Please help me with this question write down 5 ways in which animals make adaptations to dry climate conditions What is seven divided by 2? the thick mucus secreted by the tissues lining the respiratory passages is known as hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm If a tRNA molecule has an anticodon which reads AUGACA, what was the codon of the mRNA molecule? CGUCAC TACTGT TAGTGT UACUGU