1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
4 years ago
10

You need to set up a network that needs to span multibple buildings. For this reason, you want to use the cabling that supports

the longest maximum cable length. Which network topology provides this?
Computers and Technology
1 answer:
prisoha [69]4 years ago
5 0

Answer:

Extended star topology

Explanation:

The Extended star topology also known as the tree topology comprises of characteristics of the linear bus topology and star topology.

It consist of multiple star connected topologies connected to a linear backbone bus topology. It has a wider communication area than the star topology and uses more cabling length. All the star networks are connected to a central connection which allows to have a full functioning network when others fails.

You might be interested in
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
borishaifa [10]

Answer:

Jennifer can find the list of all the frequently used program icons on the left pane of the start menu. Below this list, still on the left pane, all programs installed on her computer will be listed in alphabetical order.

Explanation:

I hope this helps

7 0
4 years ago
To recover a deleted document, what would you choose in the Info window?
kiruha [24]
Retrive you can restart your computer press f8 it will takr you to a menu were you can choos recover lost files then go from there
6 0
4 years ago
Which is not a component of a database that describes how data is stored?
valentinak56 [21]
<span>Which is not a component of a database that describes how data is stored?

</span>
5 0
4 years ago
You're setting up some VMs to test an application you're considering making available to employees of the small company you work
IgorLugansk [536]

Answer:

Snapshots in VirtualBox, Hyper-V, and please check explanation.

Explanation:

You should never test the software on your PC as you never know what virus or threat they bring with them. Even when you are a software company and testing your own new software, you should use the VM, as it is safe. Any adverse effect can be tackled as the VM is made to be destroyed some day.

You can install numerous OS on your VM. The two best are certainly Virtual Box and the Hyper-V from VMWare. Remember, if you dont want to use the licensed version of certain OS, the trial versions are always available for free, and you can install them on the VMs.

There is a snapshot option on the VirtuabBOX. You are only required to create the snapshot after creating and configuring the VM. It supports Windows, Linux and Mac. So you can install almost any OS. However, VMWare Player does not support the Snapshot, but it provides s similar option known as Checkpoints. However, VMware Workstation supports Snapshots, though they might be costly.

If you are on OS X you can make use of Parallels.

However, never enable file sharing, and stay away from Bridge mode as well as never use your original accounts. File sharing will inject the malware if any to all places on network. The bridge mode connects the VM directly to the network, which otherwise remain hidden behind NAT. And use of personal accounts can cost you them, and this can be quite a big loss definitely.  

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of these features will future games incorporate?
    8·2 answers
  • You will be administratively suspended if you have a breath or blood alcohol level of.... or above or refuse to submit to a chem
    12·1 answer
  • Car batteries have two terminals which are (blank).
    8·2 answers
  • In a CPMT, a(n) ____ should be a high-level manager with influence and resources that can be used to support the project team, p
    10·1 answer
  • Why has the PCM sampling time beenset at 125 microseconds?
    11·1 answer
  • Which is an internet service? <br> A.) antivirus <br> B.) chat <br> C.) firewall<br> D.) router
    6·2 answers
  • How to check if serial interface is dte ot DCE?
    13·1 answer
  • Determine the lines that refer to specialty accommodation.
    5·1 answer
  • Which string method returns true if the character is a lowercase letter?
    11·1 answer
  • A(n) _____ is the address of a document or other file accessible on the internet.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!