1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
13

Which topology connects all the computers in a circular pattern

Computers and Technology
2 answers:
Nimfa-mama [501]3 years ago
5 0
You have to give us the answer options kiddo!
Bond [772]3 years ago
4 0

Answer:

ring topology

Explanation:

You might be interested in
What is the most flexible way to modify a report?
Vesna [10]

Answer: Use the Design view

Explanation: Using a Design view to modify a report is the most flexible way to modify a report as opposed to a layout view which is another way to modify a report .  The design view  is flexible in the sense that it provides a more outlined structured view of your report that you can see the header and footer for the report. it also affords you the ability to control your  report in terms of changing many properties, adjusting images, labels  and editing  text box, etc.

8 0
2 years ago
For the block of 400 addresses, what is the length of the net id? njit
rewona [7]
23 bits would leave room for 512 node numbers.
3 0
3 years ago
Describe the steps involved in data mining or data analytics when viewed as a process of knowledge discovery.
Aleksandr [31]

Answer:

1. Data Cleaning

2. Data Integration

3. Data Selection

4. Data transformation

5. Data Mining

6. Pattern Evaluation

7. Knowledge presentation

Explanation:

The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:

Step 1. Data cleaning: this involves the elimination of inconsistent data.

Step 2. Data integration: this involves the combination of data from multiple sources.

Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.

Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.

Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.

Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.

Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.

6 0
3 years ago
What is a URL (Please explain)?
GalinKa [24]
Definition

URL a.k.a uniform resource locater, is simply the address of a World Wide Webpage.

Sentence example:

"Type a URL into a browser's address bar."
5 0
3 years ago
g Points The critical section cannot be executed by more than one process at a time. false true Save Answer Q3.28 Points The cod
Ira Lisetskai [31]

Answer: Hello your question lacks some details attached below is the missing detail

answer :

a) True , B) False  C) True  D) True

Explanation:

a) True ; The critical section cannot be executed by more than one process at a time

b) False : The code does not satisfy the progress condition, because while loops are same hence no progress

c ) True :  The code satisfies the bounded waiting condition, because of the waiting condition of the while loop

d) True : No matter how many times this program is run, it will always produce the same output, this is because of the while loop condition

7 0
3 years ago
Other questions:
  • Write a program that accepts any number of homework scores ranging in value from 0 through
    10·1 answer
  • Why does a satellite requires two bridges?
    11·1 answer
  • What's the name of this apex legend hero​
    13·2 answers
  • What keyword do we use when instantiating an object _________________
    15·1 answer
  • Rest or take a break every __ minutes when typing. Please help!
    5·2 answers
  • How do you double space on microsoft word?
    5·1 answer
  • After Lola gave her friend the password to a protected website, her friend was able to remember it only long enough to type it i
    7·1 answer
  • What is the main advantage that a website builder offers for web development?
    9·2 answers
  • Which of these is NOT an input device?
    14·1 answer
  • How to check the at&t internet speed on my computer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!