1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
6

Which topology enables only one person, at one time, to send data to others on the network?

Computers and Technology
1 answer:
Stella [2.4K]3 years ago
5 0

Question:

Which topology enables only one person, at one time, to send data to others on the network?

Answer:

Ring topology

You might be interested in
What is the first and last value of i to be displayed by the following code snippet? int n = 20; for (int i = 0; i <= n; i++)
frutty [35]

Answer:

The first value of i is 0 and last value of i is 20.

Explanation:

The following are the description of a given loop.

  • In this problem, there are two loops one is the internal loop and the other is the external loop
  • In the outer loop, the value of " i" is initialized with "0" So the first value is printed 0 in the console.
  • For one value of "i" all the inner loop is executed.
  • The loop is executed is less equal to 20 that's why the last value of "i" is printed 20 in the console window.

6 0
2 years ago
9. Question
Gennadij [26K]
A server stopped provide service to 100 users
5 0
2 years ago
I need help ASAP please and thank you!
nalin [4]

Answer:

Best: 1 or 4

Worst: 3

Explanation:

I'm not sure if number one is imply to ask your coworker to explain it or actually help with the workload. I think 4 would be the right answer because that is what they are there for and you don't want to distract your coworkers.

7 0
2 years ago
Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu
GuDViN [60]

Answer:

The system that will be more prone to attack or vulnerability is the  bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.

Explanation:

Solution

If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable  to unauthorized persons or individuals.

The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.

With this example, the chances of vulnerability or attacks increases from the following :

  • Accounts payable could be disturbed by changing cash in payment false.
  • Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
  • Transaction fraud like hacking, masquerading are very common in a networked system.
3 0
2 years ago
Suppose that, on average, 4 percent of all cd drives received by a computer company are defective. the company has adopted the f
kicyunya [14]

The fraction of shipments that will be accepted is 0.1299.

<h3>How to calculate the probability?</h3>

Probability of a defective DVD = 0.04

Using Binomial distribution,

Fraction of shipments accepted = Probability of zero defects in sample of 50 = P(X = 0)

= 50C0 * 0.040 * (1 - 0.04)⁵⁰

= 0.96⁵⁰

= 0.1299

Fraction of shipments accepted = Probability of zero or one defects in sample of 50 = P(X = 0) + P(X = 1)

= 50C0 * 0.040 * (1 - 0.04)50-0 + 50C1 * 0.041 * (1 - 0.04)50-1

= 0.9650 + 50 * 0.04 * 0.9649

= 0.4005

Learn more about probability on:

brainly.com/question/24756209

#SPJ1

6 0
2 years ago
Other questions:
  • To include totals and other statistics at the bottom of a datasheet, click the ____ button on the HOME tab to include the Total
    12·1 answer
  • Marissa works at a company that makes perfume. She noticed many samples of the perfume were not passing inspection. She conducte
    6·2 answers
  • SOMONE TELL ME THERE ROBLOX USER NAME AND DO U PLAY IT!!!!! MINE IS Borutouzimaki2133
    9·2 answers
  • Identify the modern-day printmaking process, also known as screenprinting, in which the artist squeegees paint through a mesh sc
    15·1 answer
  • Some cases have ____, also called spacers, which are round plastic or metal pegs that separate the motherboard from the case, so
    9·1 answer
  • harry is analyzing inbound network traffic and notices a tcp packet that has the FIN,PSH, and URG flags set at the same time. wh
    8·1 answer
  • Select
    14·1 answer
  • Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
    9·1 answer
  • Lucas wants to expand his vocabulary to better understand the sentence below. The insidious burglar moved through the house unhe
    7·2 answers
  • Convert<br> 0.625 to binary
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!