1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
2 years ago
6

What is a circular network.​

Computers and Technology
2 answers:
LiRa [457]2 years ago
7 0

Answer:

Something that requires more than 2 brain cells for you to comprehend.

Travka [436]2 years ago
5 0

Answer:

A circular network happens when you have two (or more) routes to the same controller. Typically, the routes are BACnet/IP and BACnet/Ethernet and both are communicating on both networks. This could happen with BACnet MS/TP although it is rare.

Explanation:

You might be interested in
after clicking the start button on your computer screen desktop what option would you then select to examine systems components
xenn [34]
You would click on control panel to get to that area
7 0
3 years ago
Emily has to create an audio-visual presentation on animated movies. Which input device will she be LEAST likely to use while cr
Slav-nsk [51]
A joystick is less likely to be used while creating this presentation. Obviously, If your intention is to create an audio-visual presentation on animated movies, a computer should be used. With a computer, comes a keyboard, a mouse and a microphone as well.

A Joystick is used to control video games and play simulator games. Therefore, I do not see the need of using a joystick in this situation.

6 0
3 years ago
When computing the net cash provided by operating activities under the indirect method on the statement of cash flows, a decreas
levacccp [35]

Answer: False

Explanation:

The given statement is false, as in the indirect method there is decrease in the common stock value are not be subtracted from the net income because it is not the current liability.

In the cash flow method, the cash flow from the operating activities are prepared by using two methods that are:

  • Direct method
  • Indirect method

The cash flow indirect method, indicate the net income figure from the given income statement. It is basically used to represent the net cash with all the necessary earnings from the actual cash received.

3 0
3 years ago
Kathy is a senior teacher in her school. She is conducting a group discussion between parents and teachers. Her role is to ensur
Fynjy0 [20]
She is the leader of the discussion
3 0
3 years ago
Read 2 more answers
Write a C++ program that usesInsertion Sort to sort an unsorted list of numbers.
andrew11 [14]

<u>C++ program - Insertion sort</u>

<u></u>

#include <bits/stdc++.h>  

using namespace std;  

/* Defining function for sorting numbers*/

void insertionSort(int array[], int n)  

{  

   int i, k, a;  

  for(i=1;i<n;i++)

           {

              k=array[i];

               a=i-1;

            while(a>=0 && array[a] > k) // moving elements of array[0 to i-1] are greater than k, to one position //

                      {

                       array[a+1] = array[a];

                        a =a-1;

                      }

              array[a+1] =k;

             }  

}              

/* Driver function */

int main()  

{  

   int array[] = { 12,56,76,43,21};   //input integers

   int n = sizeof(array) / sizeof(array[0]);   //finding size of array

 

   insertionSort(array, n);   //Calling function

    for (int i = 0; i < n; i++)   //printing sorted array

        cout << array[i] << " ";  

    cout << endl;  

    return 0;  

}  

5 0
3 years ago
Other questions:
  • Direct messages are the only private forms of communication on Twitter. True False
    10·1 answer
  • List 3 items that were on kens resume that should have been excluded
    13·2 answers
  • Bulldog Holdings is a U.S.-based consumer electronics company. It owns smaller firms in Japan and Taiwan where most of its cell
    5·1 answer
  • How might the website owner use theses details other than to verify login details?
    6·2 answers
  • PLEASE HELP FAST !!!!!!!!!!
    12·1 answer
  • The ____ criteria filter requires the records displayed to start with the specified text string
    14·1 answer
  • Prepare a risk assessment report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security
    14·1 answer
  • Which statement best describes network security
    8·2 answers
  • Graphic software task​
    7·1 answer
  • New product ideas must fit into a company's mission statement and?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!