1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
2 years ago
6

What is a circular network.​

Computers and Technology
2 answers:
LiRa [457]2 years ago
7 0

Answer:

Something that requires more than 2 brain cells for you to comprehend.

Travka [436]2 years ago
5 0

Answer:

A circular network happens when you have two (or more) routes to the same controller. Typically, the routes are BACnet/IP and BACnet/Ethernet and both are communicating on both networks. This could happen with BACnet MS/TP although it is rare.

Explanation:

You might be interested in
A user calls your help desk and says that he is trying to configure his Word document so that the text within his paragraphs is
katrin [286]

Answer:

The best answer would be

Explanation:

To access this command ...

Select the Format tab - Properties - Paragraph properties - Bleeds and spaces

7 0
3 years ago
Mikayla is researching copyright information for images found on a website. She needs to figure out the legal name of the compan
Pie

Answer:

C. Footer

Explanation:

A footer is typically found at the bottom of all web pages and it comprises of information such as disclaimers, copyright, legal which are displayed visibly for all visitors to see.

Generally, a website footer is the direct opposite of a website header in relation to positioning or location; a footer is always found at the bottom while a header is always found at the top of a web page.

Since Mikayla is researching copyright information for the images found on a website, she should access the website footer because it primarily provides information about the legal name of the company that owns the website and information about what country they're located in, as well as links to other relevant resources such as call to action, maps, contact forms, newsletter signup etc.

3 0
3 years ago
Unit 7 - Planning and Designing a Website
quester [9]

Am not sure about no.2 and no.4
But am going to answer
1.true
3.true
5.true
8 0
2 years ago
How many bits must be "flipped" (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase that’s represented
Alexxandr [17]
Only one ... the third bit of the byte, numerical 32.  Every lower-case letter 
has a '1' in that place.  If that bit is changed to '0', then the code represents
the upper-case form of the same letter.
8 0
3 years ago
Read 2 more answers
A____________ is defined as (1) a program of care devoted to providing comfort to terminally ill people through a team approach
Alborosie

Answer:

palliative care

Explanation:

Palliative care is a program dedicated for people who is terminally ill. Palliative care is aimed to relieve symptoms and street of the illness and at the same time improve quality of life for the patient. This program involves a team of doctors, nursers and also patient's family members. One important point is that, the palliative care is not based on patient's prognosis but to provide support to the patient based on their needs.

6 0
3 years ago
Other questions:
  • What is an additional clock tab
    11·1 answer
  • The location on the Word screen where text will be entered is known as the _____.
    14·1 answer
  • High Frequency Traders are
    5·1 answer
  • Which of the following is an example of new and emerging classes of software?
    11·1 answer
  • Many mobile devices can perform Internet searches and other tasks via
    8·1 answer
  • You dad has given you his old digital scanner for your new computer. you plug it into the usb drive on your windows 8 computer b
    8·1 answer
  • What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initializatio
    13·1 answer
  • 14. Which of the following is NOT a
    6·2 answers
  • What is a trojan horse
    8·2 answers
  • Help pls<br> cmu cs 0<br> 4.1.2.1 Creating Groups checkpoint 1
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!