1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kramer
4 years ago
15

Which topology requires a central controller or hub?

Computers and Technology
1 answer:
Brut [27]4 years ago
3 0
I Think it is Topology of star but I am not sure.
You might be interested in
Write a brief explanation of the problems that can occur in each of the following scenarios and what you should do to avoid thes
photoshop1234 [79]
1. Horsing around can lead to breaking equipment in the classroom or somebody getting hurt

2. leaving your backpack on the floor can cause someone to fall

3.something unexpected may happen and worsen the problem

4. it can corrupt the computer's files and deleted unsaved work.

if you want the sentences to be longer, add some words to them and make the message the same.
4 0
4 years ago
What is a view? How do you define a view? Does the data described in a view definition ever exist in that form? What happens whe
Tomtit [17]

Answer:

A view is an application

program’s or an individual user’s picture of the database.

It is less involved than the full database.

If a user accesses a database through a view they can only view data but cannot make any changes to the structure of the database

3 0
3 years ago
A protocol is:
Setler [38]

Answer:

The answer is: B) a standard set of rules and procedures for control of communications in a network .

Explanation:

To exchange information between computers across a network, there must be a preexisting agreement as to how the information will be structured and how the sender and receiver will behave. Without a protocol, receive or send information, the communication between computers will be impossible. The computer protocol is OSI (Open Systems Interconnection) sets guidelines for implementing networking communications between computers.

8 0
3 years ago
Developed by ibm and refined by symantec, the __________ provides a malware detection system that will automatically capture, an
Nadya [2.5K]
Digital Immune System (DIS)
6 0
3 years ago
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________
tresset_1 [31]
The answer is Phishing
3 0
4 years ago
Read 2 more answers
Other questions:
  • Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing individual and departmental goa
    9·1 answer
  • What does the key combination ctrl+s achieve?
    7·2 answers
  • A. True <br> b. False: variables represent storage locations in the computer's memory.
    13·1 answer
  • Su
    6·1 answer
  • Which is an advantage of setting bookmarks?
    15·1 answer
  • For each of the following SQL queries, for each relation involved,list the attributes that must be examined to compute the answe
    9·1 answer
  • Rapid development programming languages eliminate the possibility of having bugs in code. True or False
    8·1 answer
  • A common approach of networking multiple computers as opposed to a single computer is? called:
    14·1 answer
  • Which of the following is the largest measurement for the weight of a bag of dog food?
    9·2 answers
  • Implement the function printTwoLargest that inputs an arbitrary number of positive numbers from the user. The input of numbers s
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!