1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
7

A disadvantage of a bus network is that _____. a. failure in one workstation necessarily affects other workstations on the netwo

rk b. data flows in only one direction from one computer to the next c. devices cannot be attached or detached without disturbing the rest of the network d. performance can decline as more users and devices are added
Computers and Technology
1 answer:
andrew11 [14]3 years ago
6 0

A disadvantage of a bus network is that <u>performance can decline as more users and devices are added</u>

<u></u>

Explanation:

  • A bus network is an arrangement in a local area network (LAN) in which each node is connected to a main cable or link called the bus.
  • The advantages of a bus network are: it is easy to install. it is cheap to install, as it doesn't require much cable.

The disadvantages of a bus network are:

  1. If the main cable fails or gets damaged the whole network will fail.
  2. As more workstations are connected the performance of the network will become slower because of data collisions.
  3. Every workstation on the network "sees" all of the data on the network – this is a security risk.
  • Bus topology is used for small workgroup local area networks whose computers are connected using a thinnet cable. Trunk cables connecting hubs or switches of departmental LANs to form a larger LAN.
  • Bus topology uses one main cable to which all nodes are directly connected. The main cable acts as a backbone for the network. One of the computers in the network typically acts as the computer server. The first advantage of bus topology is that it is easy to connect a computer or peripheral device.

You might be interested in
Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log o
olga_2 [115]

Answer:

Enable secret.

Explanation:

When both commands are enabled IOS will only accept that password which configured in the hidden command allow.

So, when the user has configured the allow hidden code from the terminal, accompanied by the allow password code. Then, enable secret command describes the password you must have entered to reach privileged mode

8 0
3 years ago
How are online sources used? Check all that apply.
n200080 [17]

Answer:

As a way to learn from others, as a way to find information

Explanation:

When you read about lets say how to make a certain cookie mix you like your learning from someone else. The source is also helping you find information about that topic you want. Its not supposed to be a way for entertainment or games, its not a platform for you to talk to  others, and not made for you to just copy and take credit.

3 0
3 years ago
Read 2 more answers
Is it possible to build something that doesn't exist yet?
Anastasy [175]

Answer:

yes

Explanation:

how do u think other thing were built like when phones were first made

5 0
3 years ago
How does a computer interact with its environment? How is data transferred on a real computer from one hardware part to another?
Dmitriy789 [7]

Answer:

Explanation:

A computer system can interact with its environment using hardware that does so such as cameras, robotic arms, thermometers, smart devices etc. These hardware devices gather information from the environment and transfer it to the computer system in a format known as bits through binary electrical impulses. If the system is designed to be autonomous then the only human interaction needed would be the initial setup of the system and its hardware, once this is done the system does not need any more human interaction as long as nothing breaks.

8 0
3 years ago
Pretrial services programs are also known as early intervention programs. <br> a. True <br> b. False
tensa zangetsu [6.8K]
A) True 


Good luck! (:
7 0
3 years ago
Other questions:
  • Describe the difference between public and private IPv4 addresses. If a network is using private IP addresses, how can the compu
    13·1 answer
  • What are indexes in a database?
    14·1 answer
  • Which column and row references are updated when you copy the formula: =SUM($B5:D$15)?
    6·2 answers
  • Intuitively, which of the following would happen to e⃗ net if d became very large?
    6·1 answer
  • To activate Spelling and Grammar check using the ribbon, navigate first to the _____ tab
    14·2 answers
  • To get a GIMP file into a different format, you need to
    7·1 answer
  • 50 POINTS<br><br>Question linked in file below.
    5·1 answer
  • When is the kids choiceee awads?????????????????????????
    12·2 answers
  • Spreadsheet software can be used to do all the following except _____.
    5·2 answers
  • A studio camera is generally small and lightweight enough to be taken out into the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!