Early 100BaseT NICs, just like 10BaseT NICs, could send and receive data, but not at the same time-a feature called ____________________.

Fill in the blank(s) with the appropriate word(s).


half-duplex

Computer Science & Information Technology

You might also like to view...

A friend's computer came with Windows 8 operating system.  Which of the following years was the computer most likely bought in?

A. 1999 B. 2001 C. 2009 D. 2012

Computer Science & Information Technology

The ____ filter redraws an image as if it were coated in shiny plastic.

a. Plastic Wrap b. Underwater c. Warp d. Saran

Computer Science & Information Technology

Which of the following is true regarding bag operations as a physical method of identity theft?

a. They include sifting through commercial or residential trash or waste for information deemed valuable. b. They are typically conducted by the host government's security or intelligence services. c. They are executed by depositing personal documents in unlocked containers on the side of the road until they are retrieved. d. They involve the creation of shell companies that engage in the collection of personal financial information.

Computer Science & Information Technology

One of the leading causes of damage to sensitive circuitry is __________.

A. CPU B. EPA C. ESD D. HVAC

Computer Science & Information Technology