1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nastasia [14]
4 years ago
7

A bus topology network is most often deployed as a peer-to-peer network. a. True b. False

Computers and Technology
1 answer:
faltersainse [42]4 years ago
3 0
Idk the answer im sorry
You might be interested in
Hello hello . please help me​
adelina 88 [10]

Answer:

#include <iostream>  

using namespace std;  

int main()  {  

 int num, check=0;  

 for(int num = 1; num<=100;num++){

for(int i = 2; i <= num/2; i++)  {

     if(num % i == 0)   {  

         check=1;  

         break;         }     }  

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

 return 0;  

}

Explanation:

This line declares num as integer which represents digits 1 to 100.

A check variable is declared as integer and initialized to 0

<em>  int num, m=0, check=0;   </em>

This for loop iterates from 1 to 100

 for(int num = 1; num<=100;num++){

This iterates from 2 to half of current digit

for(int i = 2; i <= num/2; i++)  {

This checks for possible divisors

     if(num % i == 0)   {  

If found, the check variable is updated to 1

         check=1;  

And the loop is terminated

         break;         }     }  

The following if statement prints the prime numbers

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

5 0
3 years ago
Read 2 more answers
Identify one type of business or organization that you believe would have serious risks if they chose to use VLANs and/or VPNs.
german

Answer:

National security agency

Explanation:

A lot of the private VPNs are own by corporations outside the USA, a national security agency is constantly sending sensitive and priceless data over the internet, when you decide to use a VPN it is possible for the service provider to share the decrypted information with others, therefore, if the national security agency at issue decide to use the service of an unscrupulous VPN provider their sensitive information could end in the hands of a foreign government who is willing to pay a lot for the data.

Note: there could be a case in which the VPN service provider is not corrupted, but the government forces them to share the information through legal actions.

5 0
4 years ago
. What is the difference between a combinational circuit and sequential circuit? Give example of each.
Licemer1 [7]

A combinational circuit is a complex circuit with different elements... for eg. computer motherboard is a very complex circuit with a lot of different elements connecting other components of computer as well.

A sequential circuit is a bit more primitive often a part of combinational one. For eg. three resistors connected in parallel.

Hope this helps.

r3t40

7 0
3 years ago
What is the term that is used to describe a computer system that could store literary documents, link them according to logical
madreJ [45]

Answer:

hypertext

Explanation:

Based on the information provided within the question it can be said that the type of computer system function being described is known as hypertext. This displays text to the computer display that references other literary documents for immediate access to them. These are documents with a specific relation to the text that is being displayed and also allows readers to comment and annotate what they read on the documents.

5 0
3 years ago
____, a Symantec product, offers a number of residential firewall and security applications that also provide various degrees of
Alexeev081 [22]

Answer:

Norton

Explanation:

<h2><u>Fill in the blanks </u></h2>

<u>Norton</u> , a Symantec product, offers a number of residential firewall and security applications that also provide various degrees of content filtering and proxy services.

4 0
3 years ago
Other questions:
  • When converting old html code to xhtml, make sure to replace the ____ attribute with the background-color style?
    10·1 answer
  • 3. By eliminating data redundancy, you're enforcing data A. validation. B. integrity. C. consistency. D. accuracy.
    14·2 answers
  • Which recovery method usually involves an evasion effort and is dependent on the ip's condition?
    11·1 answer
  • Write the C++ if statement that compares the contents of the quanity variable to the number 10. If the quantity variable contain
    12·1 answer
  • Why don’t we need to know and memorize the IP addresses for our favorite websites?
    15·1 answer
  • Which function will show 6 as the answer in the following formula<br><br> =_ (36)
    10·1 answer
  • NEED FIVE QUESTIONS ANSWERED!!!
    7·1 answer
  • What is not true about field properties in Access?
    13·1 answer
  • Identify a true statement about heuristics: a. They are more complicated than algorithms. b. Unlike algorithms, they do not perm
    15·1 answer
  • Which of the following uses the proper syntax for creating an HTML comment?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!