1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
5

Alright, so im currently trying to pass a computer science class. i need it done in a little under 2 weeks. Ill just ask the one

question right now, but if someone is willing to help me with the whole thing, that would be more than fantastic.
Nodes in this type of network are connected to a central hub.
A) bus B) mesh C) ring D) star
Computers and Technology
1 answer:
Alla [95]3 years ago
5 0

Answer:

B. Mesh

Explanation:

You might be interested in
Please answer fast computer picture above​
Bas_tet [7]

Answer:embedded computers are found in cats, appliances like light switches and voic actived tvs, security cameras, dvd players and elevators

Explanation:

5 0
2 years ago
According to Newton's Second Law of Motion, when an object is acted on by an unbalanced force, how will that object respond?
Murrr4er [49]
A. It will decrease speed
5 0
3 years ago
Which step is first in changing the proofing language of an entire document?
Genrish500 [490]
Select the whole document by pressing Ctrl+a.
7 0
3 years ago
Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic r
Ray Of Light [21]

Answer: (B) Legal hold

Explanation:

As being a security director, the security director are approached to solidify a server that run the red hat enterprise server the 5.5.

The servers are being utilized as DNS (Dynamic host service) and the server time. This is not utilized as the database, print server and the web server. There is no particular remote associations with the server.

The window of the command will be given the root accessing. Then, it provide the associated by means of a protected shell with the access root in the system.

 

3 0
3 years ago
C Programming:
natita [175]
This is how to answer this programming question:

#include <stdio.h>
#include <conio.h>

int main(void)
{
   char letterStart;
   
   <span>fflush(stdin);</span>
   printf("Input character: ");
   scanf("%c", &letterStart);
   
   print("Next Letter: %c", ++letterStart);
   
   getch();
   clrscr();
}

7 0
3 years ago
Read 2 more answers
Other questions:
  • Define the method object inc_num_kids() for personinfo. inc_num_kids increments the member data num_kids. sample output for the
    11·1 answer
  • What in Microsoft word brings up mini toolbar
    7·1 answer
  • 80% OF QUESTIONS ARE ANSWERED IN UNDER 10 MINUTES why not mine
    15·2 answers
  • Temporary storage location for cutting and pasting
    9·1 answer
  • Why is e-mail better for informative and positive messages than for negative ones?
    6·1 answer
  • Science is a body of knowledge that extends back to Select one: a. the time of Galileo. b. Italy in the 16th century. c. Greece
    6·1 answer
  • Two technicians are discussing shielded cable. Technician A says that shielded wires are generally twisted in pairs to cancel th
    14·1 answer
  • What are two different ways by which a laptop could utilize the cellular network connection of a mobile device
    15·1 answer
  • Are all the computer users known as programmer ​
    11·1 answer
  • ____ uses a computer to design and test new products and modify existing ones. Computer-aided manufacturing Just-in-time design
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!