1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nata [24]
3 years ago
11

Explain how applying different network topologies could have an impact on the security of a network

Computers and Technology
1 answer:
nika2105 [10]3 years ago
4 0

Answer:

More open

Explanation:

Hackers could get in easier

You might be interested in
When the POST is complete,t he operating systems is loaded into?
Lina20 [59]
<span>After the POST is successfully completed the CPU searches Storage devices for special files that indicate the beginning of the OS and then loads it into memory. </span>

<span><span>The sequence in which the storage devices are searched is part of the configuration set-up stored in BIOS. 

</span><span>Once the Operating System (OS) is located, the CPU copies what’s called the 'boot record' from the OS into DRAM. 

</span><span>Control is then passed to the 'boot record' in DRAM, which then continues loading the rest of the OS. 

</span><span>This process continues until the OS load is completed. 

</span><span>When the OS load is completed the Desktop appears in the display and waits for you, the user, to tell it what you want it to do.</span></span>
4 0
3 years ago
A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his fir
frutty [35]

Answer:

Well, I would definitely advise him to buy USB hubs.

Explanation:

USB hub is a device that can give additional USB slot for the user just by consuming one single slots. In recent years, USB hubs can contain more than 9 slots with different variety, including HDMI and DVI that is required by this particular friend.

Using this device will make it easier to plug in and plug out all the devices he wants to his laptop since it all connected to one single hub.

Since he only has the budget under 100$ , Dell DA300 6-in-1 USB-C Hub could be a good option for Him.

6 0
3 years ago
Why is it important to use dates as file names?
Orlov [11]
It is important so you know when it was made for the future
so you can figure out what it is for if you forget
6 0
4 years ago
Which writing format is also beneficial to public speaking? a. Five paragraph essay c. Conventions b. Prose d. None of these
garri49 [273]
convention writing is beneficial to public speaking because writing conventions such as spelling,punctuation,capitalization and grammar help make a student content clear and understandable audience can finish reading without having to stop to try to figure out what was actually intended,the value of learning these writing becomes clear.<span />
4 0
3 years ago
Read 2 more answers
Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi
timurjin [86]
My bad my friend was like that I don’t got it to go home I don’t want him texting him or whatever I don’t gotta is like I gotta do it
3 0
4 years ago
Other questions:
  • Which of the following is true of tape? Group of answer choices It is no longer used as a primary method of storage but is used
    10·1 answer
  • Radio waves pros and cons
    10·2 answers
  • What is an icon or animation used to represent a participant in an internet chat referred to as
    15·2 answers
  • Describe the six clauses in the syntax of an SQL retrieval query. Show what type of constructs can be specified in each of the s
    14·1 answer
  • Suzanne has inserted an image into her document and would like to adjust the color and contrast of the image.
    11·1 answer
  • Charts are often used in _____ to quickly represent data and help the readers understand the data.
    11·1 answer
  • It is generally safe to download mobile apps from<br>unknown sources.​
    9·2 answers
  • If an organization’s DNS server can resolve a DNS request from its own cache, the DNS server is said to be ____.
    11·1 answer
  • PLEASE HELP!
    5·1 answer
  • Stanovte intenzitu magnetického poľa v strede tenkej cievky s 20 závitmi. Prúd je 2A , stredný polomer cievky je 4cm.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!