1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
9

In a ____, a single communication path connects the network server, departmental servers, workstations, and peripheral devices.

Computers and Technology
1 answer:
nevsk [136]3 years ago
4 0
In a bus network, a single communication path connects the network server,departamental servers, workstations, and peripheral devices.
c. bus network
You might be interested in
Which of the following statements is true of a server? Question 18 options: A) It supports processing requests from remote compu
TiliK225 [7]

Answer:

Option (A) is the correct answer of this question.

Explanation:

The server supports the processing requests from the remote computers. A system is a device built to accommodate inquiries from many other external systems and customers to execute transactions. Employees are called private computer ,tablets, including phones which connect websites.

Network resources are handled through servers.The server is a software application or tool providing a service to some other software program and its customer, also identified as those of the user.

Other options are incorrect because they are not related to the given scenario.

5 0
3 years ago
The button for adding a picture to a spreadsheet is found in the
boyakko [2]
The answer is Insert Tab. This is the button to add a picture to a spreadsheet.  <span>Click </span>Insert to add something to a spreadsheet. This includes pictures, shapes, charts, links, text boxes, video and more. <span>The </span>Insert Tab<span> is used to </span>insert<span>    different features such as tables, pictures, clip art, shapes, charts, page numbers, word art, headers, and footers into a document. </span>
6 0
3 years ago
How many bits do you need to count up to 30 help please
Soloha48 [4]

Answer:

5

Explanation:

2⁵ = 32, so that fits.

In general, to calculate the number of bits without guessing, you can take the 2 log of the number and then round up:

\log_2 30 \approx 4.9

rounded up gives 5.

3 0
3 years ago
What is a guardian node summary for theta staking tool
Diano4ka-milaya [45]

Answer: Theta Guardian

Explanation:

THETA is used to stake as a Validator or Guardian node, contributing to block production and the protocol governance of the Theta Network. By staking and running a node, users will earn a proportional amount of the new TFUEL generated. Relayers earn TFUEL for every video stream they relay to other users on the network.

3 0
3 years ago
In 2-5 paragraphs, describe how you would create a new database using your software.
Nikitich [7]

Answer:

1. open the software

2. select a new blank database or database wizard

3. name the database

4. enter field names and select the type of field (text, number, date, currency)

5. make one of the fields the primary key

6. click done, or save and close

7. open the table and add records

5 0
3 years ago
Other questions:
  • When it comes to saving money, what is a good rule of thumb?
    5·2 answers
  • Rachel completed typing an official docment with a word processing program. She wants to make sure that her document has no typo
    15·2 answers
  • A web __________, such as internet explorer or mozillaâs firefox, allow users to access the world wide web.
    10·1 answer
  • To what extent can u justify that computer is not the only ICT tool?​
    9·1 answer
  • What are three ways to call attention to the text on a web page?
    6·2 answers
  • "The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
    11·1 answer
  • You’re browsing the internet and realize your browser is not responding. Which of the following will allow you to immediately ex
    11·1 answer
  • 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
    12·1 answer
  • Who here has a crush on jk from bts but feels more mature than him
    10·2 answers
  • How to test someone elese internet speed from a distance
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!