menu
QAmmunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
10. How does a command work in conjunction with a switch? a. The switch modifies the command’s functionality and output. b. The command modifies the switch’s functionality and output. c. The switch and
asked
Sep 15, 2015
165k
views
4
votes
10. How does a command work in conjunction with a switch?
a. The switch modifies the command’s functionality and output.
b. The command modifies the switch’s functionality and output.
c. The switch and the command are used by each other to produce filtered output.
d. The command only uses switch functionality when needed since the switch is an optional parameter.
I'm really terrible at this.
Computers and Technology
high-school
Aravind A
asked
by
Aravind A
8.5k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
1
vote
Im not completely sure, but i believe the answer is b. Different switches can be used at different times which have different outputs. You could switch cases in one program and use a different one in another and get different outputs.
GeirGrusom
answered
Sep 20, 2015
by
GeirGrusom
7.7k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Apr 23, 2024
120k
views
You are the IT security administrator for a small corporate network. You need to increase the security on the switch in the Networking Closet by restricting access management and by updating the switch's
Puffadder
asked
Apr 23, 2024
by
Puffadder
7.8k
points
Computers and Technology
high-school
1
answer
4
votes
120k
views
asked
Mar 23, 2024
227k
views
When connected to a programmable controller, the actual wiring of a switch’s contacts (limits, floats, push buttons, etc.) requires that one switch be connected to a dedicated controller input terminal.
Humty
asked
Mar 23, 2024
by
Humty
7.8k
points
Engineering
college
1
answer
2
votes
227k
views
asked
Jul 1, 2024
106k
views
an attack that attempts to overload a switch's content-addressable memory (cam) table is called . group of answer choices a. arp spoofing d. dns poisoning c. mac flooding b. arp poisoning
Kiran Shahi
asked
Jul 1, 2024
by
Kiran Shahi
7.3k
points
Computers and Technology
high-school
1
answer
2
votes
106k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
Disadvantages of using animation in advertising? advantages and disadvantages of using animation for education? advantages and disadvantages of using animation in entertainment?
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search QAmmunity.org