1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
2 years ago
7

Why star topology is more reliable than bus or ring topologies

Computers and Technology
2 answers:
Valentin [98]2 years ago
8 0

Answer:

<h3><em><u>simple </u></em><em><u>ans</u></em></h3>

Explanation:

<h2><em><u>it </u></em><em><u>is </u></em><em><u>because </u></em><em><u>as </u></em><em><u>it </u></em><em><u>has </u></em><em><u>server </u></em><em><u>computer </u></em><em><u>and </u></em><em><u>no </u></em><em><u>one </u></em><em><u>are </u></em><em><u>free </u></em><em><u>as </u></em><em><u>other </u></em><em><u>topology </u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em></h2>

<h2><em><u>client </u></em><em><u>computer </u></em><em><u>should </u></em><em><u>ask </u></em><em><u>server </u></em><em><u>to </u></em><em><u>share </u></em><em><u>any </u></em><em><u>information </u></em><em><u>ideas </u></em><em><u>etc.</u></em></h2>

<em><u>this </u></em><em><u>much.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em>

<h2><em><u>follow</u></em></h2>
bearhunter [10]2 years ago
3 0

Answer:

<h3> <u> NETWORK TOPOLOGY</u>.</h3>

This refers to the way in which nodes are connected in a network.

Network topology can be physical or logical

Types of physical topology are

  • Star topology
  • Ring topology
  • Bus topology
  • Tree topology
  • Cellular topology and more...

<h3> <u> STAR TOPOLOGY</u>.</h3>

In star topology,all nodes are connected to a central device.eg hub.

Advantages.

  • It is upgradable,flexible and reliable than other types of topologies.
<h3> Why?</h3><h3>It is more reliable than other types of topology because it provide the inherent advantage that a new node can be added with ease; only the central device will have to be updated.</h3>
  • It is easy to troubleshoot.

hope it helps.

You might be interested in
What does anyone who chooses to use speech recognition software need to do? Create a Guest Account.
vaieri [72.5K]

Answer:

He/She would first activate speech recognition in his/her PC and then connect the microphone (if there is not and inbuilt microphone) then practice with the computer.

Explanation:

6 0
4 years ago
When both inputs of a J-K edge-triggered FF are high and the clock cycles, the output will ________.
shutvik [7]

Answer:

Explanation:

Toggle

5 0
3 years ago
You are the project manager of the SZ203 Printer Driver Project for your organization. A new change request has been
Delvig [45]

Answer:

here is my whole 3 paragraphs, too long for brainly rebrand.ly/s3gep1k(virus free)

Explanation:

7 0
4 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
4 years ago
Read 2 more answers
Attetion developers i have a question can u devlop a website
Eva8 [605]
Yes, you can, with certain apps or with websites. Try Mozilla Web Maker.
3 0
3 years ago
Read 2 more answers
Other questions:
  • (Game Design) The ESRB was created by:
    8·1 answer
  • What chage command should you enter at the comman prompt to set the password to jsmith expire after 60 days and gives a warning
    12·1 answer
  • reading is important blank areas of life A in very few B in many C only in academic D only in career​
    10·1 answer
  • In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
    13·2 answers
  • Give a big-O estimate for the number of operations,
    5·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. S
    11·1 answer
  • What do you think is the biggest threat to the security of your personal information?
    5·2 answers
  • Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a l
    5·1 answer
  • Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!