1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
2 years ago
12

Five computers are connected to a switch in a star topology. what type of network is this?

Computers and Technology
1 answer:
nalin [4]2 years ago
5 0
The answer to ur question is CLOSED NETWORK
You might be interested in
An ___ is any person who spends times using technology at home
Irina-Kira [14]
The answer to this is home user
3 0
3 years ago
Which line in the following program will cause a compiler error? 1 #include 2 using namespace std; 3 int main() 4 { 5 int number
Elden [556K]

Answer:

Line 1

Explanation:

Line one is not complete. It should have been #include <iostream> This line tells the compiler to use the input and output header file for this program, the iostream header file contains the functions necessary for output statements used in 7 and 8

3 0
2 years ago
What kind of fragment is near the computer?
Snezhnost [94]

Answer: C)Prepositional phrase

Explanation: Prepositional phrase is the the phrase that defines the relation between the word with noun or pronoun.The mostly used phrase are  about, near, before, after, in etc. and then the word/object is used in the phrase .

Other given options are incorrect because independent clause is the clause not dependent on others, subordinating conjunction display the connection between two clauses and predicate is the part of the clause.Thus the correct option is option is option(C).

8 0
3 years ago
A(n) __________ prevents outsiders from accessing corporate information the user does not want others to see.
kobusy [5.1K]

Answer:

Firewall

Explanation:

A Firewall prevents outsiders from accessing corporate information the user does not want others to see. It could be in the form of a hardware or a software.

Most companies use this in order to keep confidential informations from the public. This is very important to prevent unauthorized access which could lead to different types of problems in the long run.

4 0
2 years ago
. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
Komok [63]

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

3 0
3 years ago
Other questions:
  • What is the resistance of a 1,000-foot length of #6 AWG wire at a temperature of 25 degrees C? A. 0.1593 ohm B. 0.4028 ohm C. 0.
    7·1 answer
  • When should students practice netiquette in an online course? Check all that apply.
    14·2 answers
  • Nina aspires to be a digital media specialist. What should Nana be familiar with in order to pursue this career?
    9·2 answers
  • If the Account Number field in a record always should display the three characters in the account number in uppercase, then the
    14·1 answer
  • Determine if the following statement is true or false:
    5·2 answers
  • pDevices used to prevent data from being written to a disk can connect to a computer through FireWire, SATA, PATA, and SCSI cont
    10·1 answer
  • What are the top ten alternative songs of the 2000's?
    7·1 answer
  • Which of the following statements best illustrates how value was created for eggs? when a farmer sells a chicken who is no longe
    9·1 answer
  • You have a passage of text that needs to be typed out, but some of the letter keys on your keyboard are broken! You're given an
    14·1 answer
  • What is added to brining liquid to add flavour​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!