1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
2 years ago
15

What is a mesh topology? Why is it not used commonly?​

Computers and Technology
1 answer:
Deffense [45]2 years ago
6 0

what is a mesh topology?

Why is it not used commonly?

<u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u>

<h2>QUESTION:</h2>

WHAT IS A MESH TOPOLOGY?

  • A mesh topology is a network set-up where each computer and network device is interconnected with one another.This topology set-up allows for most transmissions to be distributed even of one of the connections goes down.lt is a topology commonly used for wireless networks.

WHY IS IT NOT USED COMKONLY?

  • Because of the sidnificant cost and work involved in having network components directly connected to every other component.

<u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u>

\qquad \qquad \qquad \qquad \qquad \large \color{pink}{ \mathrm{09 / \: 07/\: 22}}

You might be interested in
How many bytes of information can be stored on a hard drive?
CaHeK987 [17]
1,073,741,824 bytes.
3 0
3 years ago
You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What lang
nignag [31]

The code below is written in JavaScript and does not seem malicious.

<h3>What is a Malicious Code?</h3>

A Malicious code is one that is not designed for any productive end but to cause disruptions in the computer with the objective of

  • harming the workstation; or
  • destroying the data stored therein.

There are numerous classifications of malicious codes and they can be identified and removed by an application called an Anti-Virus or malicious app remover.

Learn more about JavaScript at:
brainly.com/question/16698901

8 0
3 years ago
What kind of personal information are you comfortable sharing with others online? Why? What steps do you take to control how tha
GaryK [48]

Answer:

this is more of an opinion question regarding what you personally do

8 0
3 years ago
Read 2 more answers
Pseudocode of creating a program to convert to IEEE 754 to a real number
Eduardwww [97]

Answer:

  • Step1: Check If the number is Positive or Negative.  
  • Step2: If it is positive then save the sign of it as 0.  
  • Step3: If it is negative then save the sign of it as 1.
  • Step4: Covert the negative number to Positive.
  • Step5: Convert the IEEE 754 to Binary.
  • Step6: convert the integer part into binary form  
  • Step7: Convert fractional part into binary form
  • Step8: To convert Integer part, Devide the number by 2 and note down the reminder and Keep deviding unless dividend is less than 2
  • Step9: copy all the reminders together
  • Step10: Multiply decimal part by 2 unless fractional part is 0.
  • Step11: By noting down integral part, keep multiplying decimal part by new value of 2 untill perfect number is reached.
  • Step6: Find the Mantissa.
  • Step7: Concatinate the Sign, exponent and the mantissa.

Explanation:

For Example : 20.75

First step (converting 50 (in base 10) to binary):

  • No is Positive
  • By dividing 20 by 2, which gives 10 with no remainder 0.
  • Now Devide 10 by 2, which gives 5 with a remainder of 0.
  • Now Devide 5 by 2, which gives 2 the reminder as 1
  • Now Devide 2 by 2, which gives 1 with reminder as 0
  • Now devide 1 by 2, which gives 0 with reminder as 1
  • We read the result from bottom to top  which is 10100

Second part is to convert 0.75 to binary:

  • We have to multiply 0.75 by 2, which gives 1.5. We keep only the integer part, which is 1.  
  • Now, we do 1.5 - 1, which gives 0.5. Now, We multiply 0.5 by 2, which gives 1.  
  • Now we do 1 - 1, which gives 0.
  • Reading from Top to bottom will give 110

Final Answer is : 10100.110

8 0
3 years ago
You can use Spotify to embed or link to what media
Anna35 [415]

Spotify is an application that is used to play music, podcasts, and songs using internet access.

<u>Explanation:</u>

Spotify is a very versatile and well-developed application that enables it to personalize the user experience. The user is provided to choose their favourite singers and composers. A user can select language preferences about the music they like.

The algorithms of Spotify work in a fashion so as to recommend more music from the user's preferences and previously played songs. Two users can have different preferences and subsequently, their Spotify will appear in a different manner from each other because of the personalization that has been provided to them through their preferences.    

8 0
3 years ago
Other questions:
  • When technology advances which of the following always takes place?
    6·2 answers
  • Which of the following is something you need to keep an eye out for
    7·2 answers
  • Five aplications of ict​
    10·1 answer
  • In ____, data can move in both directions at the same time, such as with a telephone.
    11·1 answer
  • The component of an information system consisting of raw facts is the definition for which of the following?
    14·2 answers
  • In what way can an employee demonstrate commitment?
    15·2 answers
  • In MS Word we can merga cells true or false​
    13·2 answers
  • Information that's been collected to help solve a problem is called
    10·1 answer
  • What kind of company would hire an Information Support and Service employee?
    8·1 answer
  • Alina is using a small database that uses just one table to store data. What type of database is Alina using?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!