1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
9

Which of the following is not a common network architecture type?

Computers and Technology
1 answer:
solong [7]3 years ago
3 0

Answer:

c

Explanation:

i guess bcs i didnt learn this actually

You might be interested in
A report has a column of totals, with each total adding to the cell above it. What kind of calculated figure is this?
Alexxx [7]

ANSWER:

The correct answer is Running Sum.

Explanation:

A report has a column of totals, with each total adding to the cell above it. Such type of calculated figure is called the Running Sum.

Running sum is also called the Partial Sum. In such type of summation, the values in the sequence is added to get a final result and then if a new number comes, it is again added to the grand sum, and in this way the sequence continues. Every new entry is added to the previous sum to get another sum.

3 0
3 years ago
Write out code for a nested if statement that allows a user to enter in a product name, store the product into a variable called
OlgaM077 [116]

Answer:

product_name = input("Enter product name : ")

if product_name=="pen"or"book"or"box"or"pencil"or"eraser":

   if product_name == "pen":  

       amount = 10

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

   if product_name == "book":

       amount = 100

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

   if product_name == "box":  

       amount = 150

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

   if product_name == "pencil":  

       amount = 5

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

   if product_name == "eraser":

       amount = 8

       print(f"Product Name: {product_name}\nCost: {amount} rupees")

else:  

   print("Item not found!")

Explanation:

The python program is a code of nested if-statements that compares the input string to five items of the first if-statement. For every item found, its code block is executed.

6 0
3 years ago
Given the following code: public class Test { public static void main(String[] args) { Map map = new HashMap(); map.put("123", "
Phoenix [80]

Answer:

There are no statements in the question, so I explained the whole code.

Explanation:

A map consists of key - value pairs. The put method allows you to insert values in the map. The first parameter in the put method is the key, and the second one is the value. Also, the keys must be unique.

For example, map.put("123", "John Smith");   -> key = 123, value = John Smith

Even though the key 123 is set to John Smith at the beginning, it will have the updated value Steve Yao at the end. That is because the keys are unique.

Note that the key 222 also has Steve Yao for the value, that is totally acceptable.

5 0
3 years ago
After you select your recipients, the next step in using the Mail Merge Wizard would be to _____.
NARA [144]

Answer:

Write your letter

Explanation:

When using a Mail Merge Wizard in a Microsoft Word Document, this is the process.

  • Click on your document type
  • Click on the starting document
  • Select the recipient(s)
  • Write your letter and add some custom fields
  • Insert your address Block
  • Strike enter and click on Greeting line (to enter a greeting)
  • Preview your letter and click on complete merge
3 0
3 years ago
Read 2 more answers
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
3 years ago
Other questions:
  • To arrange data in alphabetical order quickly, you can _____ the data.
    7·2 answers
  • You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?
    10·2 answers
  • What are the four types of technical drawing?​
    9·1 answer
  • Nuclear batteries use devices called thermocouples, which convert the ____ of a nuclear reaction into electricity.
    9·1 answer
  • write a pay-raise program that requests a person's first name, last name, and current annual salary, and then displays the perso
    6·1 answer
  • This assignment will again take the form of a compare/contrast essay. You will use the fresco of Christ Teaching the Apostles in
    14·1 answer
  • Write a Python program (rainfall.py) to collect data and calculate the average rainfall over a period of years. The program shou
    11·1 answer
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
  • Would my phone still work if I snapped it in half?
    8·2 answers
  • Self-driving cars are a result of developments in which field of computer<br> science?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!