1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
3 years ago
10

You need to set up a network that needs to span multibple buildings. For this reason, you want to use the cabling that supports

the longest maximum cable length. Which network topology provides this?
Computers and Technology
1 answer:
prisoha [69]3 years ago
5 0

Answer:

Extended star topology

Explanation:

The Extended star topology also known as the tree topology comprises of characteristics of the linear bus topology and star topology.

It consist of multiple star connected topologies connected to a linear backbone bus topology. It has a wider communication area than the star topology and uses more cabling length. All the star networks are connected to a central connection which allows to have a full functioning network when others fails.

You might be interested in
What area contains the command used to customize the print options in microsoft excel?
Nezavi [6.7K]
The answer is Page Layout Ribbon.  The <span>area contains the command used to customize the print options in microsoft excel is Page Layout Ribbon.</span>
4 0
3 years ago
100 points aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Rina8888 [55]

Answer:

An algorithm enables the programmer to perform a task or mission. So the answer is A. A loop is repeating while a website requires loops and algorithms

3 0
3 years ago
Read 2 more answers
Why dose enginuty suck like really
masya89 [10]

Answer:

if you don't like it why u doin it?

Explanation:

3 0
3 years ago
What data unit is encapsulated inside a packet?
Rom4ik [11]

Answer:

The Datalink layer encapsulates each packet in a frame which contains the hardware address (MAC) of the source and destination computer (host) and the LLC information which identifies to which protocol in the prevoius layer (Network layer) the packet should be passed when it arrives to its destination.

Explanation:

5 0
3 years ago
Read 2 more answers
Which of the following are examples of security threats?
svetoff [14.1K]

Answer:

b,c.d

Explanation:

bc i got it wrong

3 0
1 year ago
Other questions:
  • Categories of functions specified by computer instruction?
    11·1 answer
  • How many years does it take in total to complete Bachelor’s, Master’s, and Phd in CS?
    14·1 answer
  • Lenovo laptop
    7·1 answer
  • Write a C++ program that determines if an integer is a multiple of 7. The program should prompt the user to enter and integer, d
    13·1 answer
  • Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be
    15·1 answer
  • How is an interpreter different from a compiler?
    9·2 answers
  • Ms office suite comes with its own set of pictures in the​
    5·1 answer
  • What do you think about Naruto?
    7·2 answers
  • Which of the following actions is most likely to raise legal or ethical concerns?
    14·2 answers
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!