1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
4 years ago
9

A hierarchical topology is also called a _____ topology.

Computers and Technology
1 answer:
Vedmedyk [2.9K]4 years ago
5 0
It is also called a tree topology.it combines computers with different strengths in different organizational levels.<span />
You might be interested in
Implement the function is_maxheap which takes a list of integers and returns True if the list represents a valid max-heap, and F
harkovskaia [24]

Answer:

I am writing a Python function:

def is_maxheap(list):

   #finds the length of the list  

   size=len(list)

   #loop has a variable i which starts traversing from root til end of last #internal node

   for i in range(int((size - 2) / 2) + 1):  

       if list[2 * i + 1] > list[i]:  #If left child is greater than its parent then return #false  

               return False  

       if (2 * i + 2 < size and

           list[2 * i + 2] > list[i]):    #checks if right child is greater, if yes then #returns false  

               return False

   return True

Explanation:

The function is_maxheap() traverses through all the internal nodes of the list iteratively. While traversing it checks if the  node is greater than its children or not. To check the working of this function you can write a main() function to check the working on a given list. The main() function has a list of integers. It then calls is_maxheap() method by passing that list to the function. The program displays a message: "valid max heap" if the list represents valid max-heap otherwise it returns invalid max heap.

def main():

   list = [10,7,8]  

   size = len(list)  

   if is_maxheap(list):

       print("Valid Max Heap")  

   else:  

       print("Invalid Max Heap")          

main()

The program along with its output is attached in a screenshot.

5 0
4 years ago
I am writing a Python code to ask a user to enter students' information including name,
White raven [17]

Answer:

student_file = {}

endf_input = '1'

for x in iter(list, 1):

   name = input("Enter a student name: ")

   st_id = int(input("Enter a student id number: "))

   student_file[name] = st_id

   endf_input = input("Add more student to file (type 1 for yes and 0 to end): ")

   if endf_input == '0':

       break

print("Search for Student")

search = int(input("Enter student id: "))

if search == 0:

   print("Sorry, no student with id of zero.")

   quit()

for key, value in student_file.items():

   if value == search:

       print(f"Student name: {key}")

Explanation:

The program source code uses a for loop to continuously add data to the student file dictionary structure but breaks from the loop when a zero is received as input. The program enters search mode and returns the name of the student with the searched id number.

7 0
3 years ago
What do you understand by technological depenence?
son4ous [18]

Answer:

It helps you understand stuff faster

Explanation:

7 0
3 years ago
What information is displayed in the message header of a received message? Check all that apply.
Nesterboy [21]
The answers are:


-the message subject
-the name of the sender
-the names of recipients
-the time and date the message was sent
8 0
3 years ago
Read 2 more answers
entry that has the address of 192.168.101.0 and the wildcard mask of 0.0.0.255. What is the range of IPv4 addresses that will be
svp [43]

Answer:

192.168.101.0 through 192.168.101.255 is the correct answer.

Explanation:

The following answer is correct because the address of the ACL entry is 192.168.101.0 and 0.0.0.255 is the wildcard mask then, the range of the IPv4 addresses is 192.168.101.0 through 192.168.101.255 that affected by the ACL.

ACL is referred as the access control list that acts as the firewall which secures the VPC network of the user.

6 0
3 years ago
Other questions:
  • Secondary storage devices that are input and output devices include all except:
    10·1 answer
  • Which is a form of malware? A. clickjacking B. spam C. cookies D. Trojan horse
    7·2 answers
  • Hidden-surface removal is the process of:
    14·1 answer
  • Which statements identify what astronomers currently know and think will happen with our universe? Check all that apply.
    15·2 answers
  • Completed the given flowchart using the algorithm steps which is given in wrong order. 1.Input time 2.Stop 3.Print "Good morning
    8·1 answer
  • You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, aft
    10·1 answer
  • There are 2048bytes in4megabytes true or false​
    10·1 answer
  • Which of the following is the best description of an ip address?
    8·1 answer
  • true false the if statement causes one or more statements to execute only when a boolean expression is true
    10·1 answer
  • If you want to load the "my-data.csv" file to Dataframe so that you can explore find out the number of data items in the data se
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!