Answer: talk about da progrm
Explanation:
Answer:
Topology means arrangement of nodes
Explanation:
In computer science the word topology means the arrangement of nodes and elements in a network. For any topology we do need nodes and cables for maintaining the infrastructure.
In mesh topology the all nodes use to get connected by direct link. While each and every node is directly associated with one another. In this infrastructure we do need lot cabling where every node will be connected with one another. While usage of good quality cable in network is also expensive to manage. Although there are lot of benefits of this topology, where the transmission of data would never stop if node is not working the rest will be working to transfer the data among other nodes ,this is more secure because there is no traffic for data to travel via many nodes to reach the destination. Every node is directly connected and communicate. So, once the node is not working the communication will not be stop but the maintenance and troubleshooting will be difficult in this infrastructure.
It is proved along with lot of benefits and network security ,this infrastructure is having some disadvantages as well. Cabling expense , maintenance cost etc . usually small scale networks do not prefer mesh topology. Small scale and low budget companies can not afford this topology because it is expensive.
Although we do believe that the data security is most important for today's era ,so few companies those wanted to keep their information secure and confidential they must use mesh topology by ignoring the cost incurred for this set up. Data security and integrity would never be compromised by some of the companies.
Mesh topology is more safer, more quick infrastructure which is although very expensive , difficult to mange and maintain. Moreover it is overhead of cabling as well to connect every node but the demand of mesh topology would never be less. It is demanding and appealing topology still.
Answer: Network access control (NAC)
Explanation:
The solution that should be used is the network access control. Network access control helps in keeping devices and users that are unauthorized out of ones private network.
In this case, since one will like to prevent the laptops from connecting to the network unless anti-virus software and the latest operating system patches are installed, then the network access control can be used. One can only give access to the device that it wants to give access to and prevent others from connecting.
Answer:
Some hardware requirement: Monitor, keyboard, mouse, sound card, memory, processor, graphics display card. Some software requirement: Windows XP/Vista, Video for Windows, Quicktime.
Explanation:
BRAINLEST
Answer:
Initially if x = a = 2437 and y = 875, condition (1) that is x>y is true and output would be x = 1562 with y = 87
Explanation:
According to pseudo code the code will run until x becomes equal to y. Initially if x = a = 2437 and y = 875, condition (1) that is x>y is true. So next step would be x=x-y and output would be x = 1562 with y = 875. With initial values x = a = 2437 and y = 875, x becomes equal to y after 21 iterations and output is x=y=1
X Y
- 2437 875
- 1562 875
- 687 875
- 687 188
- 499 188
- 311 188
- 123 188
- 123 65
- 58 65
- 58 7
- 51 7
- 44 7
- 37 7
- 30 7
- 23 7
- 16 7
- 9 7
- 2 7
- 2 5
- 2 3
- 2 1
- 1 1