1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
6

A network in which communication passes from one person to another in a sequential pattern rather than being shared among member

s is referred to as a(n) question 2 options:
a.tree network
b.all-channel network
c.chain network
d.wheel network
Computers and Technology
2 answers:
Westkost [7]3 years ago
4 0
Chain Network is the answer 
Leya [2.2K]3 years ago
4 0

Answer:all channel network

Explanation:

it because all network can pass thousand of packets except brocked traffic

You might be interested in
Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and
Marianna [84]

Answer:

Executive information system ( EIS )

Explanation:

  • Other name of executive information system is executive support system.
  • It helps in decision making needs.
  • It gives simple access to internal and external data important to authoritative objectives.  
  • EIS more focuses on graphical display
  • They offer solid reporting and drill-down capacities.
  • In recent time EIS is more used in business intelligence.
8 0
3 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
A technician is tasked with installing the Windows OS on a Mac OS computer so that the computer can boot to either the Mac OS or
nata0808 [166]

Answer:

Key chain because it easier

Explanation:

4 0
2 years ago
List of bad websites and why
r-ruslan [8.4K]

Penny Juice – bad design examples.

Blinkee website – bad design example.

Great Dreams I — bad designed website.
8 0
3 years ago
____ is a systems development technique that produces a graphical representation of a concept or process that systems developers
rosijanka [135]

Answer:

D. Modeling

Explanation:

<em>Modeling</em>: It is a graphical representation, of a concept or system, technique used by software developer to analyze, test, and modify that system or concept.

4 0
4 years ago
Other questions:
  • Use the following business rules to assign name to the tables on the ERD: Note: These rules are in the context of a small retail
    7·1 answer
  • How can you create balance to your drawing using only grayscale values?
    12·1 answer
  • Which of the following is typically not found in web page-authoring software
    9·1 answer
  • Would you recommend the 4a generations of computers to a friend
    5·1 answer
  • X=10 ;
    14·1 answer
  • The __________ format is a proprietary file format defined by guidance software for use in its forensic tool to store hard drive
    15·1 answer
  • IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in
    7·1 answer
  • RTOS stands for ______ Time Operating System.
    11·1 answer
  • Write a for loop that displays the following numbers exactly like this (you must use a loop):
    15·2 answers
  • How to type an absolute reference formula in exel
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!