1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
4 years ago
9

A hierarchical topology is also called a _____ topology.

Computers and Technology
1 answer:
Vedmedyk [2.9K]4 years ago
5 0
It is also called a tree topology.it combines computers with different strengths in different organizational levels.<span />
You might be interested in
How does the team know what to work upon during the iteration
Brilliant_brown [7]

Answer:

Based on the discussions during iteration planning, team members agree on what each would work on.

Explanation:

Iteration can be defined as the way in which a process is been repeated in order to generate a possibly outcomes and this occur in a situation where the sequence will approach some end point in which each repetition of the process will be a single iteration while the outcome of each iteration will then be the starting point of the next iteration.

Therefore the team know what to work upon during the iteration Base on the discussions during iteration planning in which the team members agree on what each of them would work on.

During the iteration planning, the team collectively make a decision on how much of the backlog actually they will commit to the iteration in which the committed backlog then is taken to the delivery during the next iteration which is why the goals or objectives of the iteration get determined on the basis of the work committed.

7 0
3 years ago
Several coworkers in the sales department received an email claiming to be from you. Each message was personally addressed and c
LuckyWell [14K]

Answer:

The correct answer is A.

Explanation:

Vishing can be described as phishing but only using a mobile telephone, making the victim give up any personal information that could be used for identity theft etc.

Pharming is a process which redirects the traffic from a known and trusted website to another one where they perform the operation of stealing the personal information of the people.

The example given in the question falls into the category of "Spear Phishing" which is when the victim receive e-mails that look like they have been sent by a trusted and known individual. This way they are more likely to open the e-mail or click on the link in the e-mail and the phishing act has a higher chance of success.

I hope this answer helps.

6 0
3 years ago
The while loop has two important parts: a condition that is tested and a statement or block of statements that is repeated as lo
natima [27]

Answer:

TRUE

Explanation:

The while loop is used to run the block of statement again and again until condition is TRUE. if condition false program terminate the loop and execute the next of while statement.

syntax:

initialize;

while(condition)

{

 statement;

  increment/decrement;

)

when condition is TRUE, the block of statement execute again and again.

8 0
3 years ago
A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
malfutka [58]

Answer:

DoS or Denial of Service

Explanation:

Have a nice day! :)

3 0
3 years ago
_______ is the protocol suite for the current Internet.
Gala2k [10]
A? not very sure sorry
8 0
3 years ago
Other questions:
  • What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reco
    6·1 answer
  • One metric ton is approximately 2,205 pounds.
    6·1 answer
  • to add data to to a chart, you must format data from another microsoft office product, that automatically opens. whats the name
    10·1 answer
  • Two-dimensional random walk (20 points). A two-dimensional random walk simulates the behavior of a particle moving in a grid of
    14·1 answer
  • Difference between positional and non positional number​
    12·1 answer
  • Quiénes se benefician de la realidad virtual​
    12·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    8·1 answer
  • What is a computer please tell me ​
    10·2 answers
  • What are two potential benefits of using calendar-synchronization tools like calendly
    8·1 answer
  • Why do designers of smartphones hide computer processing details from
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!