1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
6

An educational institution has a number of buildings in the campus. Each building has its own independent network system, and al

l these networks connect to the central server located in the administration building. Which type of topology is this?
Computers and Technology
2 answers:
Aloiza [94]3 years ago
8 0
Answer: star topology.

Explanation:

The layout of the way how the computers in a netword are interconnected is called network tipology.

Some types of network topologies are:

1) Point-to-point tipology: all the computers are connected to each other directly (computer-to-computer, in pairs, this is a direct link between each two computers).

2) Bus topology: all the nodes (computers or server) are connectect to a maing cable.

3) Star topology: all the computers are connected to a central computer or server which is called central hub. This is the layout described in the question.

4) Ring topology: the computers are connectec in a circular path; each computer is connected to the next computer.

5) Mesh: every computer is connected to every other computer.




SIZIF [17.4K]3 years ago
6 0

\huge\mathfrak {Answer}

an educational institutions has a number of buildings in the campus. Each building has its own independent network system, and all these networks connects to the central server located in the administration building. This is called star topology.

Thanks

You might be interested in
Please help! i need this very quickly
Savatey [412]
Edit the shape to be merged
5 0
2 years ago
Read 2 more answers
Refer to the method f:
Goshia [24]
<h2>This function will land up in infinite function call</h2>

Explanation:

first time when the function gets invoked,

f(6,8), so k=6 & n=8, inside the function it checks k==n, ie. 6==8, returns false, then one more if is available, so 6>8 is check for , once again it is false and else loop is executed, the function is called recursively using f(k-n,n), that is f(6-8,8), it means f(-2,8) is passed.

Second time,

if(-2==8) is false, so if(-2>8) is again false and function f(-10, 8) is called

if(-10==8) is false, so if(-10>8) is again false and function f(-18,8) is called

if(-18==8) is false, so if(-18>8) is again false and function f(-26,8) is called

So this goes recursively and ends in an infinite function call.

5 0
4 years ago
consider a pipelined risc cpu with 14 stages. what is maximum speedup of this cpu over a non-pipelined implementation?
Galina-37 [17]

The maximum speedup of this cpu over a non-pipelined implementation is 14.

What do you mean by cpu?

A central processing unit (CPU), often known as a central processor, main processor, or simply processor, is the electrical circuitry that processes computer programme instructions. The CPU executes basic arithmetic, logic, controlling, and input/output (I/O) operations provided by programme instructions. This is in contrast to external components like main memory and I/O circuits, as well as specialised processors like graphics processing units (GPUs).

In general, however, a 14-stage pipeline can provide a significant speedup over a non-pipelined design, potentially up to several orders of magnitude.

To learn more about cpu

brainly.com/question/4558917

#SPJ4

6 0
1 year ago
A web site with which web address ending is most likely to contain biased information? an address ending in .edu an address endi
soldier1979 [14.2K]
A web address would most likely contain biased information when it has a domain of .com. The domain extension is considered to be the most popular because it has a wide variety of functions in media or industry. The other domains in the choices are controlled by an institution or the government.
5 0
4 years ago
Read 2 more answers
Give an efficient algorithm to find all keys in a min heap that are smaller than a provided value X. The provided value does not
viva [34]

Answer:

The algorithm to this question as follows:

Algorithm:

finding_small_element(element,Key xa) //defining method that accepts parameter

{

if (element.value>= xa) //check value

{

//skiping node

return;  

}

print(element.value);//print value

if (element.left != NULL) //check left node value

{

finding_small_element(element.left,xa); //using method

}

if (element.right != NULL) //check right node value

{

finding_small_element(element.right,xa); //using method

}

}

Explanation:

In the above pre-order traversing algorithm a method  "finding_small_element" is defined, that accepts two parameter, that is "element and ax', in which "element" is node value and ax is its "key".

  • Inside this if block is used that check element variable value is greater then equal to 0.
  • In the next step, two if block is defined, that check element left and the right value is not equal to null, if both conditions are true, it will check its right and left value. In this algorithm, there is no extra need for traversing items.
3 0
3 years ago
Other questions:
  • Mohammed's parents learn that his classmates have
    7·2 answers
  • Write the reverseO function recursively. This function takes a string and the length of the string as arguments and returns the
    15·2 answers
  • "The study of how changes in the input parameters of a linear programming problem affect the optimal solution is known as
    8·1 answer
  • How do you enter the command prompt on Chromebook
    10·1 answer
  • The total revenues for a company are $150,223 and the total expenses were 125,766. If you are calculating the net income, which
    10·1 answer
  • Why might you complete a 1040 instead of a <br> 1040ez
    11·2 answers
  • What does the following if statement do?<br><br> if (num1 == Math.abs(num1))
    12·1 answer
  • If you decide you want to meet someone you met online, what should you do first? A. Tell your best friend. B. Call the person yo
    12·1 answer
  • What do you expect the future trends of an operating system in terms of (a) cost (b) size (c) multitasking (d) portability (e) s
    12·1 answer
  • Your worksheet contains confidential information in column C; to prevent others who use your worksheet from seeing the data, you
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!