1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
5

Alright, so im currently trying to pass a computer science class. i need it done in a little under 2 weeks. Ill just ask the one

question right now, but if someone is willing to help me with the whole thing, that would be more than fantastic.
Nodes in this type of network are connected to a central hub.
A) bus B) mesh C) ring D) star
Computers and Technology
1 answer:
Alla [95]3 years ago
5 0

Answer:

B. Mesh

Explanation:

You might be interested in
The windows 8 start screen has controls, also known as its ____, that allow you to interact with the windows 8 operating system.
Angelina_Jolie [31]
Password has the control over the computer
3 0
3 years ago
WILLL PAYYYYYYYY
Nonamiya [84]
I believe it would be Use the reports wizard to create a report.
6 0
4 years ago
Because of their reasonable cost and print quality ___ printers are used in homes and schools
serious [3.7K]

'INK-JET'
because of their reasonable cost and print quality ___ printers are used in homes and schools

7 0
4 years ago
Which was the first computer brought in nepal?<br>​
Natasha_Volkova [10]

Answer:

the first conputer brought in nepal was IBM 1401

3 0
3 years ago
Read 2 more answers
Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan
Karo-lina-s [1.5K]

Answer and Explanation:

The requirements to be considered while determining the firewalls' features and locations are:

  • The reason so as to why to implement a firewall
  • Traffic inspection type required to be accomplished.
  • Best OS, i.e., Operating System suitable for the work need.
  • The method to fir firewall into the topology (network).
  • Making decision whether the firm is more suitable for software solution or application.

Some of the importants steps to be taken for the firewalls to remain effective:-

  • Use of strong password.
  • according to the usage, tweak the settings of the firewall.
  • Enable auto update for firewall.
  • Maintain consistency in settings throughout the network.
  • addition of multiple layers to the security and computer system.
  • Application of encryption (128 bit WEP).
  • Analysis of the traffic both outbound and inbound and taking appropriate measures.
  • Always check for leaks and ports.
8 0
3 years ago
Other questions:
  • ____ variables are variables that are shared by every instantiation of a class. local instance
    8·1 answer
  • Can someone help me out with this one? I'm not sure why my code is not working
    11·1 answer
  • Which IEEE standards define Wi-Fi technology?
    10·1 answer
  • Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
    12·1 answer
  • Ally typed a business letter. She used a _____.
    13·1 answer
  • Amy, a project manager, needs to make a plan that ensures consistent delivery of the right message to the right people at the ri
    11·1 answer
  • What is a rigid layer that surrounds plant cell.
    13·1 answer
  • In order to convert your project to a mobile platform, you need to do all of the following except:
    14·1 answer
  • there are these numbers that I've seen before but I don't know what they mean can someone help. I will give brainiest
    8·2 answers
  • Write pseudo code that performs the following: Ask a user to enter a number. If the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!