Ethernet switches must maintain a table of MAC addresses of the devices connected to each port.

a. true
b. false


Answer: a. true

Computer Science & Information Technology

You might also like to view...

Suppose you choose the first element as a pivot in the list {5 2 9 3 8 4 0 1 6 7}. Using the partition algorithm in the book, what is the new list after the partition?

A. 5 2 9 3 8 4 0 1 6 7 B. 4 2 3 0 1 5 6 7 9 8 C. 4 2 1 3 0 5 8 9 6 7 D. 2 3 4 0 1 5 9 8 6 7 E. 2 3 4 0 1 5 6 7 8 9

Computer Science & Information Technology

Sub procedures are often referred to as ________

A) procedures B) subs C) sps D) both A and B

Computer Science & Information Technology

To share updated information between files and programs you can insert data. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ process blocks unauthorized users from getting into a computer system.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology