Switches handle traffic using ____________________ addresses, so they operate at Layer 2.
Fill in the blank(s) with the appropriate word(s).
Media Access Control (MAC)
Computer Science & Information Technology
You might also like to view...
________ is a program that gathers information about your surfing habits without your knowledge
A) Spyware B) Shareware C) Ghostware D) Adware
Computer Science & Information Technology
To save time would it be possible to store intermediate values in registers on the datapath such as the Program Counter or Instruction Register? Explain why or why not.
What will be an ideal response?
Computer Science & Information Technology