1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mars2501 [29]
3 years ago
11

The disadvantage of this topology is that a problem with one node will crash the entire network.

Computers and Technology
1 answer:
DanielleElmas [232]3 years ago
6 0

Answer:

Bus Topology

Explanation:

In local area networks (LANs), Bus topology is used to connect all the computers on the single cable. This cable is called backbone of the network.  In this type of network when a computer sends data, it will be received on entire network.

For Example

In water line system, all the taps that are connected to single pipe. If the pipe or a single tap broken this will affect the whole system.

Entire system can be crash if any node or wire will break.

You might be interested in
The _____ contains a series of sections designed to prepare students for the ACT
Studentka2010 [4]
The answer is aspire test 
3 0
4 years ago
Read 2 more answers
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
3 years ago
(TCO B) The symbol shown as a three-sided box that is connected to the step it references by a dashed line is what?
xxTIMURxx [149]

Answer:

Annotation symbol.

Explanation:

A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

A symbol shown as a three-sided box in a flowchart, that is connected to the step it references by a dashed line is known as an annotation symbol.

This ultimately implies that, it provides additional information in the form of remarks or comments with respect to the steps in a flowchart.

8 0
3 years ago
The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cr
Kamila [148]

Answer:

Strength

Explanation:

A huge number of systems use a process called Pseudo Random Number Generation (PRNG). In NIST SP 800-90, The PRNG has a set of parameters that define various variables within the algorithm. The PRNG variable strength is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cryptographic algorithm or system.

3 0
4 years ago
Which of the following is a requirement for the Safety Data Sheet (SDS)?​
Natasha_Volkova [10]
What are the options?
4 0
3 years ago
Other questions:
  • what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email
    7·2 answers
  • Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison article and compare th
    10·1 answer
  • What is the description of a computer ram?
    7·1 answer
  • An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more developm
    10·1 answer
  • Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free pro
    14·1 answer
  • Hydraulic systems use liquids because _____.
    14·2 answers
  • A computer byte is the amount of data (measured in bits) that CPU can manipulate at one time/
    8·1 answer
  • Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are mainta
    10·1 answer
  • WILL GIVE BRAINLIEST!!!!!!!
    10·2 answers
  • Why do companies use online collaborative productivity software.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!